Malware Analysis Report

2024-12-06 03:17

Sample ID 241024-h7a7va1akp
Target Belialist.exe
SHA256 034d0ad83a1a41c3fb2be5110d68a545b2426a337006a7f34a2050a0c7a18b9a
Tags
guloader remcos remotehost discovery downloader rat collection spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

034d0ad83a1a41c3fb2be5110d68a545b2426a337006a7f34a2050a0c7a18b9a

Threat Level: Known bad

The file Belialist.exe was found to be: Known bad.

Malicious Activity Summary

guloader remcos remotehost discovery downloader rat collection spyware stealer

Guloader,Cloudeye

Remcos

NirSoft WebBrowserPassView

NirSoft MailPassView

Detected Nirsoft tools

Loads dropped DLL

Reads user/profile data of web browsers

Accesses Microsoft Outlook accounts

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Suspicious use of NtCreateThreadExHideFromDebugger

Drops file in Windows directory

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Program crash

NSIS installer

Suspicious behavior: MapViewOfSection

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-24 07:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-24 07:22

Reported

2024-10-24 07:43

Platform

win7-20241010-en

Max time kernel

152s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Belialist.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Remcos

rat remcos

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2280 set thread context of 2780 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\misjoinder.ini C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

"C:\Users\Admin\AppData\Local\Temp\Belialist.exe"

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

"C:\Users\Admin\AppData\Local\Temp\Belialist.exe"

Network

Country Destination Domain Proto
US 204.10.160.182:80 204.10.160.182 tcp
US 204.10.160.182:80 204.10.160.182 tcp
US 212.162.149.195:2404 tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp

Files

\Users\Admin\AppData\Local\Temp\nseFA67.tmp\System.dll

MD5 960a5c48e25cf2bca332e74e11d825c9
SHA1 da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256 484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512 cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da

memory/2280-20-0x0000000003250000-0x0000000005AAE000-memory.dmp

memory/2280-21-0x0000000003250000-0x0000000005AAE000-memory.dmp

memory/2280-22-0x0000000077271000-0x0000000077372000-memory.dmp

memory/2280-23-0x0000000077270000-0x0000000077419000-memory.dmp

memory/2780-24-0x0000000077270000-0x0000000077419000-memory.dmp

memory/2280-25-0x0000000003250000-0x0000000005AAE000-memory.dmp

memory/2780-26-0x0000000000470000-0x00000000014D2000-memory.dmp

memory/2780-32-0x0000000000470000-0x00000000014D2000-memory.dmp

memory/2780-36-0x0000000000470000-0x00000000014D2000-memory.dmp

memory/2780-37-0x0000000000470000-0x00000000014D2000-memory.dmp

memory/2780-41-0x0000000000470000-0x00000000014D2000-memory.dmp

memory/2780-44-0x0000000000470000-0x00000000014D2000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 0c6b44fad7d223e1283cca0abcec808f
SHA1 d3514863a419153da4b21382f2b1f32bca397c33
SHA256 2a3f16fb6380b7adef88bb4acf9baf43d27b9e81326d49a72deadf0144caff3d
SHA512 7a726d4ca84bce1704f5578b5e04e4d4555b6f08d2fedf9707ea1b17572e05d4f491d62b70b4cc6eb0811292afa6a73cfb1b453e929f8c5cd6f0b4fee28a6ded

memory/2780-47-0x0000000000470000-0x00000000014D2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-24 07:22

Reported

2024-10-24 08:15

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Belialist.exe"

Signatures

Guloader,Cloudeye

downloader guloader

Remcos

rat remcos

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft MailPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of NtCreateThreadExHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\misjoinder.ini C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2316 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 2316 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 2316 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 2316 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 2316 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe
PID 1400 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\Belialist.exe C:\Users\Admin\AppData\Local\Temp\Belialist.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

"C:\Users\Admin\AppData\Local\Temp\Belialist.exe"

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

"C:\Users\Admin\AppData\Local\Temp\Belialist.exe"

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

C:\Users\Admin\AppData\Local\Temp\Belialist.exe /stext "C:\Users\Admin\AppData\Local\Temp\sawkyhqxzfs"

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

C:\Users\Admin\AppData\Local\Temp\Belialist.exe /stext "C:\Users\Admin\AppData\Local\Temp\cvbczaaznnkxaa"

C:\Users\Admin\AppData\Local\Temp\Belialist.exe

C:\Users\Admin\AppData\Local\Temp\Belialist.exe /stext "C:\Users\Admin\AppData\Local\Temp\mxgnzsltbvccdghopo"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 204.10.160.182:80 204.10.160.182 tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 182.160.10.204.in-addr.arpa udp
US 212.162.149.195:2404 tcp
US 212.162.149.195:2404 tcp
US 8.8.8.8:53 geoplugin.net udp
NL 178.237.33.50:80 geoplugin.net tcp
US 8.8.8.8:53 195.149.162.212.in-addr.arpa udp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 213.143.182.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nseD051.tmp\System.dll

MD5 960a5c48e25cf2bca332e74e11d825c9
SHA1 da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256 484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512 cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da

memory/2316-20-0x0000000004A00000-0x000000000725E000-memory.dmp

memory/2316-21-0x00000000772D1000-0x00000000773F1000-memory.dmp

memory/2316-22-0x0000000010004000-0x0000000010005000-memory.dmp

memory/2316-23-0x0000000004A00000-0x000000000725E000-memory.dmp

memory/1400-24-0x00000000016D0000-0x0000000003F2E000-memory.dmp

memory/1400-25-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-30-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-31-0x00000000016D0000-0x0000000003F2E000-memory.dmp

memory/2572-37-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4996-47-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4996-46-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4996-42-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4996-45-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2572-39-0x0000000000400000-0x0000000000462000-memory.dmp

memory/456-38-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4996-36-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2572-35-0x0000000000400000-0x0000000000462000-memory.dmp

memory/2572-40-0x0000000000400000-0x0000000000462000-memory.dmp

memory/456-34-0x0000000000400000-0x0000000000478000-memory.dmp

memory/456-32-0x0000000000400000-0x0000000000478000-memory.dmp

memory/456-51-0x0000000000400000-0x0000000000478000-memory.dmp

memory/1400-58-0x0000000034F10000-0x0000000034F29000-memory.dmp

memory/1400-57-0x0000000034F10000-0x0000000034F29000-memory.dmp

memory/1400-54-0x0000000034F10000-0x0000000034F29000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\sawkyhqxzfs

MD5 c3c5f2de99b7486f697634681e21bab0
SHA1 00f90d495c0b2b63fde6532e033fdd2ade25633d
SHA256 76296dc29f718988107d35d0e0b835c2bf3fc7405e79e5121aa4738f82b51582
SHA512 7c60ffdc093de30e793d20768877f2f586bee3e948767871f9a1139252d5d2f593ba6f88ce0ed5f72c79faddb26186792df0581e4b6c84d405c44d9d12f951b8

memory/1400-61-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-64-0x0000000000470000-0x00000000016C4000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 a4d242ba92959e7032ece22b9fee54f0
SHA1 079796ca07d1047450b96389309e20d795eaf82b
SHA256 78b7e726af1bd2910e068f8db4867182641ace0879cace4682eb89023f890568
SHA512 bec8fe176c7a2a4907b974a044411788ef47a38a1b037052fe68f71ce437933543460a4e5355c08afac9fc36454b12531ebc0c4ffc101a8a3347fbb85e839aec

memory/1400-67-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-79-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-82-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-85-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-88-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-91-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-94-0x0000000000470000-0x00000000016C4000-memory.dmp

memory/1400-97-0x0000000000470000-0x00000000016C4000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-10-24 07:22

Reported

2024-10-24 07:36

Platform

win7-20241010-en

Max time kernel

12s

Max time network

19s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 228

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-10-24 07:22

Reported

2024-10-24 08:15

Platform

win10v2004-20241007-en

Max time kernel

140s

Max time network

128s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2376 wrote to memory of 556 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2376 wrote to memory of 556 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2376 wrote to memory of 556 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 556 -ip 556

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A