Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

04/02/2025, 13:21 UTC

250204-ql4k9synbq 10

04/02/2025, 13:18 UTC

250204-qj2znaymfj 10

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2025, 13:18 UTC

General

  • Target

    f82d15eed385a7a913b98a28bce9b27a7e3611e1c0c4d9fa65741d3fdd76d23c.msi

  • Size

    85.7MB

  • MD5

    bf866d9b4395b3c819a4cd3fd639c412

  • SHA1

    79b7f01af68b13036a493e25c83d80457a654c4c

  • SHA256

    f82d15eed385a7a913b98a28bce9b27a7e3611e1c0c4d9fa65741d3fdd76d23c

  • SHA512

    8c80f7d86d8b4df1c73b2da3cecd09f02a28b57edcf3e2597e874e549ff7cf183acb644a731ed95fb29aeea3334fc72d9144f536ad7e4868b6eec63a4bd83e13

  • SSDEEP

    1572864:BWVw9CW/3bB1B68jRGRdJFqisNA6IwEU7dwq3LnEpF2UOrZ+c4CGFyzodK2aZq9:BW5SrB6uRG6iQIu5LEzVON+vCjVY

Malware Config

Extracted

Family

bumblebee

Botnet

2

Attributes
  • dga

    45urhm0ldgxb.live

    gx6xly9rp6vl.live

    zv46ga4ntybq.live

    7n1hfolmrnbl.live

    vivh2xlt9i6q.live

    97t3nh4kk510.live

    kbkdtwucfl40.live

    qk6a1ahb63uz.live

    whko7loy7h5z.live

    dad1zg44n0bn.live

    7xwz4hw8dts9.live

    ovekd5n3gklq.live

    amwnef8mjo4v.live

    e7ivqfhnss0x.live

    rjql4nicl6bg.live

    4mo318kk29i4.live

    zpo18lm8vg1x.live

    jc51pt290y0n.live

    rg26t2dc4hf4.live

    qw9a58vunuja.live

    ugm94zjzl5nl.live

    mckag832orba.live

    pdw0v9voxlxr.live

    m4tx2apfmoxo.live

    n2uc737ef71m.live

    hkk3112645hz.live

    ugko9g5ipa4o.live

    8wgq2x4dybx9.live

    h81fx7sj8srr.live

    a4tgoqi1cm8x.live

  • dga_seed

    7834006444057268685

  • domain_length

    12

  • num_dga_domains

    300

  • port

    443

rc4.plain
1
NEW_BLACK

Signatures

  • BumbleBee

    BumbleBee is a loader malware written in C++.

  • Bumblebee family
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 47 IoCs
  • Downloads MZ/PE file 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 28 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 12 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\f82d15eed385a7a913b98a28bce9b27a7e3611e1c0c4d9fa65741d3fdd76d23c.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2916
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3836
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 2D250928E942CE91F666ADE583D085D7 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe"
        3⤵
        • Checks computer location settings
        • Checks system information in the registry
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3640
        • C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe" C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe /permachine /childprocess /silent /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode /installWebView2 /cusid:S-1-5-21-4174397412-4125106315-2776226590-1000
          4⤵
          • Checks system information in the registry
          • Executes dropped EXE
          PID:1656
        • C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\OneDrive\prerequisites\Microsoft OneDrive\OneDriveSetup.exe /peruser /childprocess /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode /installWebView2 /SetPerProcessSystemDPIForceOffKey /EnableNucleusAutoStartFix /RegisterOneDriveLauncherAutoStartTask
          4⤵
          • Checks computer location settings
          • Checks system information in the registry
          • Executes dropped EXE
          • Modifies system executable filetype association
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3308
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncConfig.exe
            "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncConfig.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:1740
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe
            C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe /installWebView2
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4452
            • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\MicrosoftEdgeWebview2Setup.exe
              C:\Users\Admin\AppData\Local\Microsoft\OneDrive\StandaloneUpdater\MicrosoftEdgeWebview2Setup.exe /silent /install
              6⤵
              • Drops file in Program Files directory
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4128
              • C:\Program Files (x86)\Microsoft\Temp\EU4486.tmp\MicrosoftEdgeUpdate.exe
                "C:\Program Files (x86)\Microsoft\Temp\EU4486.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                7⤵
                • Event Triggered Execution: Image File Execution Options Injection
                • Checks computer location settings
                • Checks system information in the registry
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2868
                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  PID:3140
                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:4656
                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
                    9⤵
                    • Executes dropped EXE
                    • Modifies registry class
                    PID:4680
                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
                    9⤵
                    • Executes dropped EXE
                    • Modifies registry class
                    PID:1200
                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe
                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe"
                    9⤵
                    • Executes dropped EXE
                    PID:440
                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTM5M0ZFQjEtMzhFMy00RjhBLTg3NTYtRDk5OTk1MEFDOTM0fSIgdXNlcmlkPSJ7NDI3QTVDMEEtMDAyMi00ODAxLUEzMjItODUwODBDNkVBMjU0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins0MDc4RTUzQS03QjUxLTREQkItQTkyRS04OTk5M0JCNzdBMTF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjQzIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjI0Mjk3Nzk0IiBpbnN0YWxsX3RpbWVfbXM9IjY4OCIvPjwvYXBwPjwvcmVxdWVzdD4
                  8⤵
                  • Checks system information in the registry
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • System Network Configuration Discovery: Internet Connection Discovery
                  PID:2876
                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{A393FEB1-38E3-4F8A-8756-D999950AC934}" /silent
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1612
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
            /updateInstalled /background
            5⤵
            • Checks computer location settings
            • Checks system information in the registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system executable filetype association
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1664
            • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
              "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart /updateSource:ODU
              6⤵
              • Checks system information in the registry
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:3104
              • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /updateSource:ODU /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode /installWebView2 /SetPerProcessSystemDPIForceOffKey /EnableNucleusAutoStartFix /RegisterOneDriveLauncherAutoStartTask
                7⤵
                • Adds Run key to start application
                • Checks computer location settings
                • Checks system information in the registry
                • Executes dropped EXE
                • Modifies system executable filetype association
                • Modifies Internet Explorer settings
                • Modifies registry class
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:652
                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\FileSyncConfig.exe
                  "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\FileSyncConfig.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:5332
                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                  /updateInstalled /background
                  8⤵
                  • Checks computer location settings
                  • Checks system information in the registry
                  • Executes dropped EXE
                  • Modifies system executable filetype association
                  • Modifies Control Panel
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:5420
                • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\Microsoft.SharePoint.exe
                  /silentConfig
                  8⤵
                  • Checks system information in the registry
                  • Executes dropped EXE
                  PID:5780
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\Microsoft.SharePoint.exe
            /silentConfig
            5⤵
            • Blocklisted process makes network request
            • Checks system information in the registry
            • Executes dropped EXE
            PID:1240
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3656
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 20D76B822BF4EF3F98560E4EB7CCB079
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4964
      • C:\Windows\System32\MsiExec.exe
        "C:\Windows\System32\MsiExec.exe" /Y "C:\Users\Admin\AppData\Roaming\HFvlKgDlGU.dll"
        2⤵
        • Blocklisted process makes network request
        PID:1240
    • C:\Windows\system32\BackgroundTaskHost.exe
      "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
      1⤵
        PID:4452
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
        1⤵
        • Checks system information in the registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3368
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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
          2⤵
          • Checks system information in the registry
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:4472
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\MicrosoftEdge_X64_132.0.2957.140.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1912
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\EDGEMITMP_50A1A.tmp\setup.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\EDGEMITMP_50A1A.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
            3⤵
            • Checks computer location settings
            • Drops file in Program Files directory
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4984
            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\EDGEMITMP_50A1A.tmp\setup.exe
              "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\EDGEMITMP_50A1A.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{1A0B7077-2FBA-4C92-AE68-087AA1BEDAC7}\EDGEMITMP_50A1A.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff7f5f2a818,0x7ff7f5f2a824,0x7ff7f5f2a830
              4⤵
              • Executes dropped EXE
              PID:4472
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTM5M0ZFQjEtMzhFMy00RjhBLTg3NTYtRDk5OTk1MEFDOTM0fSIgdXNlcmlkPSJ7NDI3QTVDMEEtMDAyMi00ODAxLUEzMjItODUwODBDNkVBMjU0fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins0M0FDREUxNy03RDQyLTRDNkQtQkRCMy1ERkNDRjJBQkI2Q0Z9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MTQwMzkyMTQzIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMjM1OSIgZG93bmxvYWRfdGltZV9tcz0iMjM1NjMiIGRvd25sb2FkZWQ9IjE3NzE4MDIxNiIgdG90YWw9IjE3NzE4MDIxNiIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iNjIyOTciLz48L2FwcD48L3JlcXVlc3Q-
          2⤵
          • Checks system information in the registry
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          PID:5304
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:668
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\FileCoAuth.exe
        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\FileCoAuth.exe" -Embedding
        1⤵
        • Executes dropped EXE
        PID:5560

      Network

      • flag-us
        DNS
        g.bing.com
        Remote address:
        8.8.8.8:53
        Request
        g.bing.com
        IN A
        Response
        g.bing.com
        IN CNAME
        g-bing-com.ax-0001.ax-msedge.net
        g-bing-com.ax-0001.ax-msedge.net
        IN CNAME
        ax-0001.ax-msedge.net
        ax-0001.ax-msedge.net
        IN A
        150.171.28.10
        ax-0001.ax-msedge.net
        IN A
        150.171.27.10
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=
        Remote address:
        150.171.28.10:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MUID=1E41AD77954C669220ACB8FE94AC6795; domain=.bing.com; expires=Sun, 01-Mar-2026 13:18:44 GMT; path=/; SameSite=None; Secure; Priority=High;
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 77D627B949484F8986B7B6AA576A0E06 Ref B: LON04EDGE1219 Ref C: 2025-02-04T13:18:44Z
        date: Tue, 04 Feb 2025 13:18:44 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=
        Remote address:
        150.171.28.10:443
        Request
        GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=1E41AD77954C669220ACB8FE94AC6795
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        set-cookie: MSPTC=_WzTGAoha37InmxUpi7CLZ0I8i9QyQl4OBmGo1DJGiA; domain=.bing.com; expires=Sun, 01-Mar-2026 13:18:44 GMT; path=/; Partitioned; secure; SameSite=None
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: F02B2ACF4E244DBC8205DD264A270FFF Ref B: LON04EDGE1219 Ref C: 2025-02-04T13:18:44Z
        date: Tue, 04 Feb 2025 13:18:44 GMT
      • flag-us
        GET
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=
        Remote address:
        150.171.28.10:443
        Request
        GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid= HTTP/2.0
        host: g.bing.com
        accept-encoding: gzip, deflate
        user-agent: WindowsShellClient/9.0.40929.0 (Windows)
        cookie: MUID=1E41AD77954C669220ACB8FE94AC6795; MSPTC=_WzTGAoha37InmxUpi7CLZ0I8i9QyQl4OBmGo1DJGiA
        Response
        HTTP/2.0 204
        cache-control: no-cache, must-revalidate
        pragma: no-cache
        expires: Fri, 01 Jan 1990 00:00:00 GMT
        strict-transport-security: max-age=31536000; includeSubDomains; preload
        access-control-allow-origin: *
        x-cache: CONFIG_NOCACHE
        accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
        x-msedge-ref: Ref A: 7639E20DBDB7479E8A9293544CC1EF96 Ref B: LON04EDGE1219 Ref C: 2025-02-04T13:18:44Z
        date: Tue, 04 Feb 2025 13:18:44 GMT
      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        140.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        140.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        13.153.16.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.153.16.2.in-addr.arpa
        IN PTR
        Response
        13.153.16.2.in-addr.arpa
        IN PTR
        a2-16-153-13deploystaticakamaitechnologiescom
      • flag-gb
        GET
        https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
        Remote address:
        95.101.143.183:443
        Request
        GET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
        host: www.bing.com
        accept: */*
        cookie: MUID=1E41AD77954C669220ACB8FE94AC6795; MSPTC=_WzTGAoha37InmxUpi7CLZ0I8i9QyQl4OBmGo1DJGiA
        accept-encoding: gzip, deflate, br
        user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
        Response
        HTTP/2.0 200
        cache-control: public, max-age=2592000
        content-type: image/png
        access-control-allow-origin: *
        access-control-allow-headers: *
        access-control-allow-methods: GET, POST, OPTIONS
        timing-allow-origin: *
        report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QWthbWFp"}]}
        nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
        content-length: 1107
        date: Tue, 04 Feb 2025 13:18:45 GMT
        alt-svc: h3=":443"; ma=93600
        x-cdn-traceid: 0.2c367a5c.1738675125.10799957
      • flag-us
        DNS
        7.98.51.23.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        7.98.51.23.in-addr.arpa
        IN PTR
        Response
        7.98.51.23.in-addr.arpa
        IN PTR
        a23-51-98-7deploystaticakamaitechnologiescom
      • flag-us
        DNS
        55.36.223.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        55.36.223.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        183.143.101.95.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        183.143.101.95.in-addr.arpa
        IN PTR
        Response
        183.143.101.95.in-addr.arpa
        IN PTR
        a95-101-143-183deploystaticakamaitechnologiescom
      • flag-us
        DNS
        92.129.74.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        92.129.74.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        179.109.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        179.109.18.2.in-addr.arpa
        IN PTR
        Response
        179.109.18.2.in-addr.arpa
        IN PTR
        a2-18-109-179deploystaticakamaitechnologiescom
      • flag-us
        DNS
        56.163.245.4.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.163.245.4.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        198.187.3.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        198.187.3.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        www.microsoft.com
        OneDriveSetup.exe
        Remote address:
        8.8.8.8:53
        Request
        www.microsoft.com
        IN A
        Response
        www.microsoft.com
        IN CNAME
        www.microsoft.com-c-3.edgekey.net
        www.microsoft.com-c-3.edgekey.net
        IN CNAME
        www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
        www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
        IN CNAME
        e13678.dscb.akamaiedge.net
        e13678.dscb.akamaiedge.net
        IN A
        95.100.245.144
      • flag-us
        DNS
        144.245.100.95.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        144.245.100.95.in-addr.arpa
        IN PTR
        Response
        144.245.100.95.in-addr.arpa
        IN PTR
        a95-100-245-144deploystaticakamaitechnologiescom
      • flag-us
        DNS
        ecs.office.com
        OneDrive.exe
        Remote address:
        8.8.8.8:53
        Request
        ecs.office.com
        IN A
        Response
        ecs.office.com
        IN CNAME
        ecs.office.trafficmanager.net
        ecs.office.trafficmanager.net
        IN CNAME
        s-0005-office.config.skype.com
        s-0005-office.config.skype.com
        IN CNAME
        ecs-office.s-0005.s-msedge.net
        ecs-office.s-0005.s-msedge.net
        IN CNAME
        s-0005.s-msedge.net
        s-0005.s-msedge.net
        IN A
        52.113.194.132
      • flag-us
        GET
        https://ecs.office.com/config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&accountType=StandaloneUpdater&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e
        OneDriveStandaloneUpdater.exe
        Remote address:
        52.113.194.132:443
        Request
        GET /config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&accountType=StandaloneUpdater&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e HTTP/1.1
        Connection: Keep-Alive
        User-Agent: OneDrive-24.211.1020.0001
        Host: ecs.office.com
        Response
        HTTP/1.1 200 OK
        Cache-Control: no-cache,max-age=43200
        Content-Length: 355
        Content-Type: application/json
        Expires: Wed, 05 Feb 2025 01:19:16 GMT
        ETag: "j0yt9x7ArHXTyAJbhQ38+KjOUe6BuVHds+II+DqydRc="
        X-Content-Type-Options: nosniff
        X-Frame-Options: DENY
        Strict-Transport-Security: max-age=31536000; includeSubDomains
        Report-To: {"group":"NelEcsUpload1","max_age":604800,"endpoints":[{"url":"https://ecs.nel.measure.office.net/api/report?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LON21r2&FrontEnd=AFD"}],"include_subdomains":true}
        NEL: {"report_to":"NelEcsUpload1","max_age":604800,"include_subdomains":true,"failure_fraction":1.0,"success_fraction":0.001}
        X-Cache: CONFIG_NOCACHE
        X-MSEdge-Ref: Ref A: C6D55432C9A84B6E9335E6A88860FD8A Ref B: LON21EDGE1320 Ref C: 2025-02-04T13:19:16Z
        Date: Tue, 04 Feb 2025 13:19:16 GMT
      • flag-us
        DNS
        132.194.113.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        132.194.113.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        msedge.sf.dl.delivery.mp.microsoft.com
        Remote address:
        8.8.8.8:53
        Request
        msedge.sf.dl.delivery.mp.microsoft.com
        IN A
        Response
        msedge.sf.dl.delivery.mp.microsoft.com
        IN CNAME
        star.sf.dl.delivery.mp.microsoft.com.delivery.microsoft.com
        star.sf.dl.delivery.mp.microsoft.com.delivery.microsoft.com
        IN CNAME
        cdp-f-ssl-nlu-net.trafficmanager.net
        cdp-f-ssl-nlu-net.trafficmanager.net
        IN CNAME
        star.sb.dl.delivery.mp.microsoft.com.edgesuite.net
        star.sb.dl.delivery.mp.microsoft.com.edgesuite.net
        IN CNAME
        a952.dscd.akamai.net
        a952.dscd.akamai.net
        IN A
        2.18.190.173
        a952.dscd.akamai.net
        IN A
        2.18.190.174
      • flag-gb
        HEAD
        https://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe
        Remote address:
        2.18.190.173:443
        Request
        HEAD /filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe HTTP/2.0
        host: msedge.sf.dl.delivery.mp.microsoft.com
        accept: */*
        accept-encoding: identity
        user-agent: Microsoft BITS/7.8
        Response
        HTTP/2.0 200
        content-length: 1656256
        content-type: application/octet-stream
        last-modified: Sat, 21 Dec 2024 22:44:31 GMT
        accept-ranges: bytes
        etag: "XebrnHCR3whSlpJlAiTYnK6GlcM="
        server: Microsoft-IIS/10.0
        x-aspnetmvc-version: 5.3
        ms-correlationid: 426811ab-e9e6-40fe-a2fe-fc38855f70f8
        ms-requestid: a537cb3e-1618-4749-8138-c9d817975f19
        ms-cv: dEkZq0J/v0uGhoB0.0
        x-aspnet-version: 4.0.30319
        x-powered-by: ASP.NET
        x-powered-by: ARR/3.0
        x-powered-by: ASP.NET
        cache-control: public, max-age=58667
        date: Tue, 04 Feb 2025 13:19:17 GMT
        alt-svc: h3=":443"; ma=93600,h3-29=":443"; ma=93600,h3-Q050=":443"; ma=93600,quic=":443"; ma=93600; v="46,43"
        akamai-request-bc: [a=2.18.181.173,b=2517139667,c=g,n=GB_EN_LONDON,o=20940]
        msregion:
        x-ccc:
        x-cid: 3
        akamai-grn: 0.adb51202.1738675157.960880d3
        access-control-max-age: 86400
        access-control-allow-credentials: true
        access-control-expose-headers: Server,range,hdntl,hdnts,Akamai-Mon-Iucid-Ing,Akamai-Mon-Iucid-Del,Akamai-Request-BC
        access-control-allow-headers: origin,range,hdntl,hdnts,CMCD-Request,CMCD-Object,CMCD-Status,CMCD-Session
        access-control-allow-methods: GET,POST,OPTIONS
        access-control-allow-origin: *
      • flag-gb
        GET
        https://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe
        Remote address:
        2.18.190.173:443
        Request
        GET /filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe HTTP/2.0
        host: msedge.sf.dl.delivery.mp.microsoft.com
        accept: */*
        accept-encoding: identity
        if-unmodified-since: Sat, 21 Dec 2024 22:44:31 GMT
        user-agent: Microsoft BITS/7.8
        Response
        HTTP/2.0 200
        content-type: application/octet-stream
        last-modified: Sat, 21 Dec 2024 22:44:31 GMT
        accept-ranges: bytes
        etag: "XebrnHCR3whSlpJlAiTYnK6GlcM="
        server: Microsoft-IIS/10.0
        x-aspnetmvc-version: 5.3
        ms-correlationid: 753f64da-5935-4255-b13c-60dc3405ce7e
        ms-requestid: 8beff6ed-a999-4286-80b6-94dadaf62450
        ms-cv: H2z6WTMuKken7l4+.0
        x-aspnet-version: 4.0.30319
        x-powered-by: ASP.NET
        x-powered-by: ARR/3.0
        x-powered-by: ASP.NET
        content-length: 1656256
        cache-control: public, max-age=61044
        date: Tue, 04 Feb 2025 13:19:17 GMT
        akamai-request-bc: [a=2.18.181.173,b=2517141548,c=g,n=GB_EN_LONDON,o=20940]
        msregion:
        x-ccc:
        x-cid: 3
        akamai-grn: 0.adb51202.1738675157.9608882c
        access-control-max-age: 86400
        access-control-allow-credentials: true
        access-control-expose-headers: Server,range,hdntl,hdnts,Akamai-Mon-Iucid-Ing,Akamai-Mon-Iucid-Del,Akamai-Request-BC
        access-control-allow-headers: origin,range,hdntl,hdnts,CMCD-Request,CMCD-Object,CMCD-Status,CMCD-Session
        access-control-allow-methods: GET,POST,OPTIONS
        access-control-allow-origin: *
      • flag-us
        DNS
        166.190.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        166.190.18.2.in-addr.arpa
        IN PTR
        Response
        166.190.18.2.in-addr.arpa
        IN PTR
        a2-18-190-166deploystaticakamaitechnologiescom
      • flag-us
        DNS
        10.110.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        10.110.18.2.in-addr.arpa
        IN PTR
        Response
        10.110.18.2.in-addr.arpa
        IN PTR
        a2-18-110-10deploystaticakamaitechnologiescom
      • flag-us
        DNS
        173.190.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        173.190.18.2.in-addr.arpa
        IN PTR
        Response
        173.190.18.2.in-addr.arpa
        IN PTR
        a2-18-190-173deploystaticakamaitechnologiescom
      • flag-us
        GET
        https://ecs.office.com/config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e
        OneDrive.exe
        Remote address:
        52.113.194.132:443
        Request
        GET /config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e HTTP/1.1
        Connection: Keep-Alive
        If-None-Match: ""
        User-Agent: OneDrive-24.211.1020.0001
        Host: ecs.office.com
        Response
        HTTP/1.1 200 OK
        Cache-Control: no-cache,max-age=43200
        Content-Length: 475
        Content-Type: application/json
        Expires: Wed, 05 Feb 2025 01:19:18 GMT
        ETag: "1yNuzrKQlISZpnntH0R9pZVQ0I3itmp0faOZzr6oNas="
        X-Content-Type-Options: nosniff
        X-Frame-Options: DENY
        Strict-Transport-Security: max-age=31536000; includeSubDomains
        Report-To: {"group":"NelEcsUpload1","max_age":604800,"endpoints":[{"url":"https://ecs.nel.measure.office.net/api/report?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LON21r5d&FrontEnd=AFD"}],"include_subdomains":true}
        NEL: {"report_to":"NelEcsUpload1","max_age":604800,"include_subdomains":true,"failure_fraction":1.0,"success_fraction":0.001}
        X-Cache: CONFIG_NOCACHE
        X-MSEdge-Ref: Ref A: C2CFBA44E28741EFB2C67AB37AD16014 Ref B: LON21EDGE0310 Ref C: 2025-02-04T13:19:18Z
        Date: Tue, 04 Feb 2025 13:19:18 GMT
      • flag-us
        DNS
        18.89.109.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.89.109.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        msedge.api.cdp.microsoft.com
        MicrosoftEdgeUpdate.exe
        Remote address:
        8.8.8.8:53
        Request
        msedge.api.cdp.microsoft.com
        IN A
        Response
        msedge.api.cdp.microsoft.com
        IN CNAME
        api.cdp.microsoft.com
        api.cdp.microsoft.com
        IN CNAME
        glb.api.prod.dcat.dsp.trafficmanager.net
        glb.api.prod.dcat.dsp.trafficmanager.net
        IN A
        172.169.87.222
      • flag-us
        POST
        https://msedge.api.cdp.microsoft.com/api/v2/contents/Browser/namespaces/Default/names?action=batchupdates
        MicrosoftEdgeUpdate.exe
        Remote address:
        172.169.87.222:443
        Request
        POST /api/v2/contents/Browser/namespaces/Default/names?action=batchupdates HTTP/2.0
        host: msedge.api.cdp.microsoft.com
        cache-control: no-cache
        pragma: no-cache
        content-type: application/json
        user-agent: Microsoft Edge Update/1.3.195.43;winhttp
        x-old-uid: {01ED04F2-1C57-4AC5-BFB9-B657DF2CBB01}; age=-1; cnt=2
        ms-correlationid: {A393FEB1-38E3-4F8A-8756-D999950AC934}
        ms-requestid: {83C98A05-D8EB-45A3-B7AE-848D6A07536E}
        ms-cv: sf6To+M4ik+HVtmZlQrJNA.0
        x-last-hr: 0x0
        x-last-http-status-code: 0
        x-retry-count: 0
        x-http-attempts: 1
        content-length: 834
        Response
        HTTP/2.0 200
        content-type: text/plain; charset=utf-8
        content-type: application/json; charset=utf-8
        date: Tue, 04 Feb 2025 13:19:22 GMT
        content-length: 104
        ms-correlationid: a393feb1-38e3-4f8a-8756-d999950ac934
        ms-requestid: 83c98a05-d8eb-45a3-b7ae-848d6a07536e
        ms-cv: {A393FEB1-38E3-4F8A-8756-D999950AC934}.0
      • flag-us
        POST
        https://msedge.api.cdp.microsoft.com/api/v1.1/internal/contents/Browser/namespaces/Default/names/msedgewebview-stable-win-x64/versions/132.0.2957.140/files?action=GenerateDownloadInfo&foregroundPriority=true
        MicrosoftEdgeUpdate.exe
        Remote address:
        172.169.87.222:443
        Request
        POST /api/v1.1/internal/contents/Browser/namespaces/Default/names/msedgewebview-stable-win-x64/versions/132.0.2957.140/files?action=GenerateDownloadInfo&foregroundPriority=true HTTP/2.0
        host: msedge.api.cdp.microsoft.com
        cache-control: no-cache
        pragma: no-cache
        content-type: application/json
        user-agent: Microsoft Edge Update/1.3.195.43;winhttp
        x-old-uid: {01ED04F2-1C57-4AC5-BFB9-B657DF2CBB01}; age=-1; cnt=2
        ms-correlationid: {A393FEB1-38E3-4F8A-8756-D999950AC934}
        ms-requestid: {970F23C9-B5DE-4404-B428-CE5FBB62C205}
        ms-cv: sf6To+M4ik+HVtmZlQrJNA.1
        x-last-hr: 0x0
        x-last-http-status-code: 0
        x-retry-count: 0
        x-http-attempts: 1
        content-length: 2
        Response
        HTTP/2.0 200
        content-type: text/plain; charset=utf-8
        content-type: application/json; charset=utf-8
        date: Tue, 04 Feb 2025 13:19:23 GMT
        content-length: 5349
        ms-correlationid: a393feb1-38e3-4f8a-8756-d999950ac934
        ms-requestid: 970f23c9-b5de-4404-b428-ce5fbb62c205
        ms-cv: {A393FEB1-38E3-4F8A-8756-D999950AC934}.0
      • flag-us
        DNS
        11.179.89.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        11.179.89.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        222.87.169.172.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        222.87.169.172.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        msedge.f.tlu.dl.delivery.mp.microsoft.com
        Remote address:
        8.8.8.8:53
        Request
        msedge.f.tlu.dl.delivery.mp.microsoft.com
        IN A
        Response
        msedge.f.tlu.dl.delivery.mp.microsoft.com
        IN CNAME
        star.f.tlu.dl.delivery.mp.microsoft.com.delivery.microsoft.com
        star.f.tlu.dl.delivery.mp.microsoft.com.delivery.microsoft.com
        IN CNAME
        cdp-f-tlu-net.trafficmanager.net
        cdp-f-tlu-net.trafficmanager.net
        IN CNAME
        wildcard.f.tlu.dl.delivery.mp.microsoft.com.edgesuite.net
        wildcard.f.tlu.dl.delivery.mp.microsoft.com.edgesuite.net
        IN CNAME
        a1847.dscd.akamai.net
        a1847.dscd.akamai.net
        IN A
        2.18.190.162
        a1847.dscd.akamai.net
        IN A
        2.18.190.183
      • flag-gb
        HEAD
        http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d
        Remote address:
        2.18.190.162:80
        Request
        HEAD /filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Encoding: identity
        User-Agent: Microsoft BITS/7.8
        X-Old-UID: {01ED04F2-1C57-4AC5-BFB9-B657DF2CBB01}; age=-1; cnt=2
        X-Last-HR: 0x0
        X-Last-HTTP-Status-Code: 0
        X-Retry-Count: 0
        X-HTTP-Attempts: 1
        Host: msedge.f.tlu.dl.delivery.mp.microsoft.com
        Response
        HTTP/1.1 200 OK
        Cache-Control: public, max-age=17280000
        Content-Length: 177180216
        Content-Type: application/octet-stream
        Last-Modified: Thu, 30 Jan 2025 22:24:43 GMT
        Accept-Ranges: bytes
        ETag: "Zn30nCFs7P9yX7o9FILxqytRM2k="
        Server: Microsoft-IIS/10.0
        X-AspNetMvc-Version: 5.3
        MS-CorrelationId: 57bc4fdb-5120-49b5-8001-a2329fc1e2df
        MS-RequestId: 9991e830-be9e-4e5d-a5d5-93f0bb823527
        MS-CV: CF4EFJgeEUeGqOzu.0
        X-AspNet-Version: 4.0.30319
        X-Powered-By: ASP.NET
        X-Powered-By: ARR/3.0
        X-Powered-By: ASP.NET
        Date: Tue, 04 Feb 2025 13:19:24 GMT
        Connection: keep-alive
        X-CID: 2
        X-CCC: GB
      • flag-gb
        GET
        http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d
        Remote address:
        2.18.190.162:80
        Request
        GET /filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d HTTP/1.1
        Connection: Keep-Alive
        Accept: */*
        Accept-Encoding: identity
        If-Unmodified-Since: Thu, 30 Jan 2025 22:24:43 GMT
        User-Agent: Microsoft BITS/7.8
        X-Old-UID: {01ED04F2-1C57-4AC5-BFB9-B657DF2CBB01}; age=-1; cnt=2
        X-Last-HR: 0x0
        X-Last-HTTP-Status-Code: 0
        X-Retry-Count: 0
        X-HTTP-Attempts: 1
        Host: msedge.f.tlu.dl.delivery.mp.microsoft.com
        Response
        HTTP/1.1 200 OK
        Cache-Control: public, max-age=17280000
        Content-Type: application/octet-stream
        Accept-Ranges: bytes
        Server: Microsoft-IIS/10.0
        X-AspNetMvc-Version: 5.3
        MS-CorrelationId: 6f60f8cc-e39b-44d3-b4d4-339059ed8366
        MS-RequestId: c8e2eff3-3eeb-4f9c-9dc9-9aaf7fc8a933
        MS-CV: y9dBBsu9vkmE74iU.0
        X-AspNet-Version: 4.0.30319
        X-Powered-By: ASP.NET
        X-Powered-By: ARR/3.0
        X-Powered-By: ASP.NET
        Last-Modified: Thu, 30 Jan 2025 22:24:43 GMT
        ETag: "Zn30nCFs7P9yX7o9FILxqytRM2k="
        Content-Length: 177180216
        Date: Tue, 04 Feb 2025 13:19:24 GMT
        Connection: keep-alive
        X-CID: 2
        X-CCC: GB
      • flag-us
        DNS
        162.190.18.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        162.190.18.2.in-addr.arpa
        IN PTR
        Response
        162.190.18.2.in-addr.arpa
        IN PTR
        a2-18-190-162deploystaticakamaitechnologiescom
      • flag-us
        DNS
        45urhm0ldgxb.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        45urhm0ldgxb.live
        IN A
        Response
        45urhm0ldgxb.live
        IN A
        149.154.153.2
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        gx6xly9rp6vl.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        gx6xly9rp6vl.live
        IN A
        Response
        gx6xly9rp6vl.live
        IN A
        45.155.37.158
      • flag-us
        DNS
        gx6xly9rp6vl.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        gx6xly9rp6vl.live
        IN A
      • flag-us
        DNS
        158.37.155.45.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        158.37.155.45.in-addr.arpa
        IN PTR
        Response
        158.37.155.45.in-addr.arpa
        IN PTR
        dataproteinessenceprocom
      • flag-us
        DNS
        158.37.155.45.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        158.37.155.45.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        zv46ga4ntybq.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        zv46ga4ntybq.live
        IN A
        Response
        zv46ga4ntybq.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        250.15.166.188.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        250.15.166.188.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        www.microsoft.com
        OneDriveSetup.exe
        Remote address:
        8.8.8.8:53
        Request
        www.microsoft.com
        IN A
        Response
        www.microsoft.com
        IN CNAME
        www.microsoft.com-c-3.edgekey.net
        www.microsoft.com-c-3.edgekey.net
        IN CNAME
        www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
        www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
        IN CNAME
        e13678.dscb.akamaiedge.net
        e13678.dscb.akamaiedge.net
        IN A
        95.100.245.144
      • flag-us
        DNS
        7n1hfolmrnbl.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        7n1hfolmrnbl.live
        IN A
        Response
        7n1hfolmrnbl.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        ecs.office.com
        OneDrive.exe
        Remote address:
        8.8.8.8:53
        Request
        ecs.office.com
        IN A
        Response
        ecs.office.com
        IN CNAME
        ecs.office.trafficmanager.net
        ecs.office.trafficmanager.net
        IN CNAME
        s-0005-office.config.skype.com
        s-0005-office.config.skype.com
        IN CNAME
        ecs-office.s-0005.s-msedge.net
        ecs-office.s-0005.s-msedge.net
        IN CNAME
        s-0005.s-msedge.net
        s-0005.s-msedge.net
        IN A
        52.113.194.132
      • flag-us
        GET
        https://ecs.office.com/config/v1/ODSP_Sync_Client/24.244.1204.0003?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e
        OneDrive.exe
        Remote address:
        52.113.194.132:443
        Request
        GET /config/v1/ODSP_Sync_Client/24.244.1204.0003?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e HTTP/1.1
        Connection: Keep-Alive
        If-None-Match: ""
        User-Agent: OneDrive-24.244.1204.0003
        Host: ecs.office.com
        Response
        HTTP/1.1 200 OK
        Cache-Control: no-cache,max-age=43200
        Content-Length: 475
        Content-Type: application/json
        Expires: Wed, 05 Feb 2025 01:20:05 GMT
        ETag: "1yNuzrKQlISZpnntH0R9pZVQ0I3itmp0faOZzr6oNas="
        X-Content-Type-Options: nosniff
        X-Frame-Options: DENY
        Strict-Transport-Security: max-age=31536000; includeSubDomains
        Report-To: {"group":"NelEcsUpload1","max_age":604800,"endpoints":[{"url":"https://ecs.nel.measure.office.net/api/report?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LTSr4c&FrontEnd=AFD"}],"include_subdomains":true}
        NEL: {"report_to":"NelEcsUpload1","max_age":604800,"include_subdomains":true,"failure_fraction":1.0,"success_fraction":0.001}
        X-Cache: CONFIG_NOCACHE
        X-MSEdge-Ref: Ref A: CAF4901895BE406EB6D2AB391862E738 Ref B: LTSEDGE1408 Ref C: 2025-02-04T13:20:05Z
        Date: Tue, 04 Feb 2025 13:20:04 GMT
      • flag-us
        DNS
        vivh2xlt9i6q.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        vivh2xlt9i6q.live
        IN A
        Response
        vivh2xlt9i6q.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        vivh2xlt9i6q.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        vivh2xlt9i6q.live
        IN A
      • flag-us
        DNS
        26.178.89.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        26.178.89.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        13.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        97t3nh4kk510.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        97t3nh4kk510.live
        IN A
        Response
        97t3nh4kk510.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        kbkdtwucfl40.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        kbkdtwucfl40.live
        IN A
        Response
        kbkdtwucfl40.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        qk6a1ahb63uz.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        qk6a1ahb63uz.live
        IN A
        Response
        qk6a1ahb63uz.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        whko7loy7h5z.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        whko7loy7h5z.live
        IN A
        Response
        whko7loy7h5z.live
        IN A
        188.40.187.128
      • flag-us
        DNS
        128.187.40.188.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        128.187.40.188.in-addr.arpa
        IN PTR
        Response
        128.187.40.188.in-addr.arpa
        IN PTR
        12818740188sinkholecaadfkie fraunhoferde
      • flag-us
        DNS
        128.187.40.188.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        128.187.40.188.in-addr.arpa
        IN PTR
        Response
        128.187.40.188.in-addr.arpa
        IN PTR
        12818740188sinkholecaadfkie fraunhoferde
      • flag-us
        DNS
        dad1zg44n0bn.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        dad1zg44n0bn.live
        IN A
        Response
        dad1zg44n0bn.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        7xwz4hw8dts9.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        7xwz4hw8dts9.live
        IN A
        Response
        7xwz4hw8dts9.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        ovekd5n3gklq.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        ovekd5n3gklq.live
        IN A
        Response
        ovekd5n3gklq.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        amwnef8mjo4v.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        amwnef8mjo4v.live
        IN A
        Response
        amwnef8mjo4v.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        e7ivqfhnss0x.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        e7ivqfhnss0x.live
        IN A
        Response
        e7ivqfhnss0x.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        rjql4nicl6bg.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        rjql4nicl6bg.live
        IN A
        Response
        rjql4nicl6bg.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        4mo318kk29i4.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        4mo318kk29i4.live
        IN A
        Response
        4mo318kk29i4.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        zpo18lm8vg1x.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        zpo18lm8vg1x.live
        IN A
        Response
        zpo18lm8vg1x.live
        IN A
        188.40.187.128
      • flag-us
        DNS
        jc51pt290y0n.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        jc51pt290y0n.live
        IN A
        Response
        jc51pt290y0n.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        rg26t2dc4hf4.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        rg26t2dc4hf4.live
        IN A
        Response
        rg26t2dc4hf4.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        qw9a58vunuja.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        qw9a58vunuja.live
        IN A
        Response
        qw9a58vunuja.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        ugm94zjzl5nl.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        ugm94zjzl5nl.live
        IN A
        Response
        ugm94zjzl5nl.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        mckag832orba.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        mckag832orba.live
        IN A
        Response
        mckag832orba.live
        IN A
        188.166.15.250
      • flag-us
        DNS
        pdw0v9voxlxr.live
        MsiExec.exe
        Remote address:
        8.8.8.8:53
        Request
        pdw0v9voxlxr.live
        IN A
        Response
        pdw0v9voxlxr.live
        IN A
        188.166.15.250
      • 150.171.28.10:443
        https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=
        tls, http2
        2.0kB
        9.4kB
        21
        19

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=

        HTTP Response

        204

        HTTP Request

        GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=9d8039fe6c5f4a0395f3c2bbee5f3e0d&localId=w:20F8B246-B7E0-8A84-5B23-1CCEC77318F6&deviceId=6825842710398056&anid=

        HTTP Response

        204
      • 95.101.143.183:443
        https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
        tls, http2
        1.5kB
        6.4kB
        17
        13

        HTTP Request

        GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

        HTTP Response

        200
      • 95.100.245.144:80
        www.microsoft.com
        OneDriveSetup.exe
        190 B
        92 B
        4
        2
      • 52.113.194.132:443
        https://ecs.office.com/config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&accountType=StandaloneUpdater&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e
        tls, http
        OneDriveStandaloneUpdater.exe
        1.0kB
        8.0kB
        9
        11

        HTTP Request

        GET https://ecs.office.com/config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&accountType=StandaloneUpdater&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e

        HTTP Response

        200
      • 2.18.190.173:443
        https://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe
        tls, http2
        40.2kB
        1.7MB
        858
        1254

        HTTP Request

        HEAD https://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe

        HTTP Response

        200

        HTTP Request

        GET https://msedge.sf.dl.delivery.mp.microsoft.com/filestreamingservice/files/c1336fd6-a2eb-4669-9b03-949fc70ace0e/MicrosoftEdgeWebview2Setup.exe

        HTTP Response

        200
      • 52.113.194.132:443
        https://ecs.office.com/config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e
        tls, http
        OneDrive.exe
        1.1kB
        8.1kB
        9
        11

        HTTP Request

        GET https://ecs.office.com/config/v1/ODSP_Sync_Client/24.211.1020.0001?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e

        HTTP Response

        200
      • 172.169.87.222:443
        https://msedge.api.cdp.microsoft.com/api/v1.1/internal/contents/Browser/namespaces/Default/names/msedgewebview-stable-win-x64/versions/132.0.2957.140/files?action=GenerateDownloadInfo&foregroundPriority=true
        tls, http2
        MicrosoftEdgeUpdate.exe
        5.9kB
        12.5kB
        26
        24

        HTTP Request

        POST https://msedge.api.cdp.microsoft.com/api/v2/contents/Browser/namespaces/Default/names?action=batchupdates

        HTTP Response

        200

        HTTP Request

        POST https://msedge.api.cdp.microsoft.com/api/v1.1/internal/contents/Browser/namespaces/Default/names/msedgewebview-stable-win-x64/versions/132.0.2957.140/files?action=GenerateDownloadInfo&foregroundPriority=true

        HTTP Response

        200
      • 2.18.190.162:80
        http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d
        http
        6.3MB
        193.7MB
        105127
        138702

        HTTP Request

        HEAD http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d

        HTTP Response

        200

        HTTP Request

        GET http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0740036a-4e18-456d-96fa-d1d9c4ca4676?P1=1739279963&P2=404&P3=2&P4=F3YnG9CG24jJaw96x0yGzuj3EbrillMfrjVsfBA%2bUxPf2j8nuutfkQAkEUD0hPJGVL5h3xBPa9tQPnw9MsKG%2fg%3d%3d

        HTTP Response

        200
      • 149.154.153.2:443
        45urhm0ldgxb.live
        MsiExec.exe
        208 B
        4
      • 45.155.37.158:443
        gx6xly9rp6vl.live
        https
        MsiExec.exe
        438 B
        212 B
        6
        5
      • 188.166.15.250:443
        zv46ga4ntybq.live
        https
        MsiExec.exe
        552 B
        92 B
        5
        2
      • 95.100.245.144:80
        www.microsoft.com
        OneDriveSetup.exe
        190 B
        92 B
        4
        2
      • 188.166.15.250:443
        7n1hfolmrnbl.live
        https
        MsiExec.exe
        552 B
        132 B
        5
        3
      • 52.113.194.132:443
        https://ecs.office.com/config/v1/ODSP_Sync_Client/24.244.1204.0003?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e
        tls, http
        OneDrive.exe
        1.1kB
        10.9kB
        10
        14

        HTTP Request

        GET https://ecs.office.com/config/v1/ODSP_Sync_Client/24.244.1204.0003?UpdateRing=Prod&OS=Win&OSVer=10.0.19041&OSSku=48&accountType=Consumer&clientid=c1057e83-621a-aa6e-7d83-6907ee547c6e

        HTTP Response

        200
      • 188.166.15.250:443
        vivh2xlt9i6q.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        97t3nh4kk510.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        kbkdtwucfl40.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        qk6a1ahb63uz.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.40.187.128:443
        whko7loy7h5z.live
        https
        MsiExec.exe
        438 B
        212 B
        6
        5
      • 188.166.15.250:443
        dad1zg44n0bn.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        7xwz4hw8dts9.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        ovekd5n3gklq.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        amwnef8mjo4v.live
        https
        MsiExec.exe
        644 B
        212 B
        7
        5
      • 188.166.15.250:443
        e7ivqfhnss0x.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        rjql4nicl6bg.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        4mo318kk29i4.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.40.187.128:443
        zpo18lm8vg1x.live
        https
        MsiExec.exe
        530 B
        212 B
        8
        5
      • 188.166.15.250:443
        jc51pt290y0n.live
        https
        MsiExec.exe
        490 B
        252 B
        7
        6
      • 188.166.15.250:443
        rg26t2dc4hf4.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        qw9a58vunuja.live
        https
        MsiExec.exe
        490 B
        252 B
        7
        6
      • 188.166.15.250:443
        ugm94zjzl5nl.live
        https
        MsiExec.exe
        902 B
        184 B
        9
        4
      • 188.166.15.250:443
        mckag832orba.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 188.166.15.250:443
        pdw0v9voxlxr.live
        https
        MsiExec.exe
        438 B
        252 B
        6
        6
      • 8.8.8.8:53
        g.bing.com
        dns
        56 B
        148 B
        1
        1

        DNS Request

        g.bing.com

        DNS Response

        150.171.28.10
        150.171.27.10

      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        140.32.126.40.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        140.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        13.153.16.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        13.153.16.2.in-addr.arpa

      • 8.8.8.8:53
        7.98.51.23.in-addr.arpa
        dns
        69 B
        131 B
        1
        1

        DNS Request

        7.98.51.23.in-addr.arpa

      • 8.8.8.8:53
        55.36.223.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        55.36.223.20.in-addr.arpa

      • 8.8.8.8:53
        183.143.101.95.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        183.143.101.95.in-addr.arpa

      • 8.8.8.8:53
        92.129.74.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        92.129.74.13.in-addr.arpa

      • 8.8.8.8:53
        179.109.18.2.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        179.109.18.2.in-addr.arpa

      • 8.8.8.8:53
        56.163.245.4.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        56.163.245.4.in-addr.arpa

      • 8.8.8.8:53
        198.187.3.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        198.187.3.20.in-addr.arpa

      • 8.8.8.8:53
        www.microsoft.com
        dns
        OneDriveSetup.exe
        63 B
        230 B
        1
        1

        DNS Request

        www.microsoft.com

        DNS Response

        95.100.245.144

      • 8.8.8.8:53
        144.245.100.95.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        144.245.100.95.in-addr.arpa

      • 8.8.8.8:53
        ecs.office.com
        dns
        OneDrive.exe
        60 B
        215 B
        1
        1

        DNS Request

        ecs.office.com

        DNS Response

        52.113.194.132

      • 8.8.8.8:53
        132.194.113.52.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        132.194.113.52.in-addr.arpa

      • 8.8.8.8:53
        msedge.sf.dl.delivery.mp.microsoft.com
        dns
        84 B
        318 B
        1
        1

        DNS Request

        msedge.sf.dl.delivery.mp.microsoft.com

        DNS Response

        2.18.190.173
        2.18.190.174

      • 8.8.8.8:53
        166.190.18.2.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        166.190.18.2.in-addr.arpa

      • 8.8.8.8:53
        10.110.18.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        10.110.18.2.in-addr.arpa

      • 8.8.8.8:53
        173.190.18.2.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        173.190.18.2.in-addr.arpa

      • 8.8.8.8:53
        18.89.109.52.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        18.89.109.52.in-addr.arpa

      • 8.8.8.8:53
        msedge.api.cdp.microsoft.com
        dns
        MicrosoftEdgeUpdate.exe
        74 B
        158 B
        1
        1

        DNS Request

        msedge.api.cdp.microsoft.com

        DNS Response

        172.169.87.222

      • 8.8.8.8:53
        11.179.89.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        11.179.89.13.in-addr.arpa

      • 8.8.8.8:53
        222.87.169.172.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        222.87.169.172.in-addr.arpa

      • 8.8.8.8:53
        msedge.f.tlu.dl.delivery.mp.microsoft.com
        dns
        87 B
        328 B
        1
        1

        DNS Request

        msedge.f.tlu.dl.delivery.mp.microsoft.com

        DNS Response

        2.18.190.162
        2.18.190.183

      • 8.8.8.8:53
        162.190.18.2.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        162.190.18.2.in-addr.arpa

      • 8.8.8.8:53
        45urhm0ldgxb.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        45urhm0ldgxb.live

        DNS Response

        149.154.153.2

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        gx6xly9rp6vl.live
        dns
        MsiExec.exe
        126 B
        79 B
        2
        1

        DNS Request

        gx6xly9rp6vl.live

        DNS Request

        gx6xly9rp6vl.live

        DNS Response

        45.155.37.158

      • 8.8.8.8:53
        158.37.155.45.in-addr.arpa
        dns
        144 B
        112 B
        2
        1

        DNS Request

        158.37.155.45.in-addr.arpa

        DNS Request

        158.37.155.45.in-addr.arpa

      • 8.8.8.8:53
        zv46ga4ntybq.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        zv46ga4ntybq.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        250.15.166.188.in-addr.arpa
        dns
        73 B
        140 B
        1
        1

        DNS Request

        250.15.166.188.in-addr.arpa

      • 8.8.8.8:53
        www.microsoft.com
        dns
        OneDriveSetup.exe
        63 B
        230 B
        1
        1

        DNS Request

        www.microsoft.com

        DNS Response

        95.100.245.144

      • 8.8.8.8:53
        7n1hfolmrnbl.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        7n1hfolmrnbl.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        ecs.office.com
        dns
        OneDrive.exe
        60 B
        215 B
        1
        1

        DNS Request

        ecs.office.com

        DNS Response

        52.113.194.132

      • 8.8.8.8:53
        vivh2xlt9i6q.live
        dns
        MsiExec.exe
        126 B
        79 B
        2
        1

        DNS Request

        vivh2xlt9i6q.live

        DNS Request

        vivh2xlt9i6q.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        26.178.89.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        26.178.89.13.in-addr.arpa

      • 8.8.8.8:53
        13.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        13.227.111.52.in-addr.arpa

      • 8.8.8.8:53
        97t3nh4kk510.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        97t3nh4kk510.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        kbkdtwucfl40.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        kbkdtwucfl40.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        qk6a1ahb63uz.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        qk6a1ahb63uz.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        whko7loy7h5z.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        whko7loy7h5z.live

        DNS Response

        188.40.187.128

      • 8.8.8.8:53
        128.187.40.188.in-addr.arpa
        dns
        146 B
        268 B
        2
        2

        DNS Request

        128.187.40.188.in-addr.arpa

        DNS Request

        128.187.40.188.in-addr.arpa

      • 8.8.8.8:53
        dad1zg44n0bn.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        dad1zg44n0bn.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        7xwz4hw8dts9.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        7xwz4hw8dts9.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        ovekd5n3gklq.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        ovekd5n3gklq.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        amwnef8mjo4v.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        amwnef8mjo4v.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        e7ivqfhnss0x.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        e7ivqfhnss0x.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        rjql4nicl6bg.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        rjql4nicl6bg.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        4mo318kk29i4.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        4mo318kk29i4.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        zpo18lm8vg1x.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        zpo18lm8vg1x.live

        DNS Response

        188.40.187.128

      • 8.8.8.8:53
        jc51pt290y0n.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        jc51pt290y0n.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        rg26t2dc4hf4.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        rg26t2dc4hf4.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        qw9a58vunuja.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        qw9a58vunuja.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        ugm94zjzl5nl.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        ugm94zjzl5nl.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        mckag832orba.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        mckag832orba.live

        DNS Response

        188.166.15.250

      • 8.8.8.8:53
        pdw0v9voxlxr.live
        dns
        MsiExec.exe
        63 B
        79 B
        1
        1

        DNS Request

        pdw0v9voxlxr.live

        DNS Response

        188.166.15.250

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Installer\setup.exe

        Filesize

        6.6MB

        MD5

        b4c8ad75087b8634d4f04dc6f92da9aa

        SHA1

        7efaa2472521c79d58c4ef18a258cc573704fb5d

        SHA256

        522a25568bb503cf8b44807661f31f0921dee91d37691bf399868733205690bf

        SHA512

        5094505b33a848badcffd6b3b93aad9ad73f391e201dee052376c4f8573ba351f0b8c102131216088ffb38d0ed7b5fe70ba95c3ac2c33a50c993584fe7c435e3

      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

        Filesize

        201KB

        MD5

        70cc35c7fb88d650902e7a5611219931

        SHA1

        85a28c8f49e36583a2fa9969e616ec85da1345b8

        SHA256

        7eca199201273f0bcff1e26778cb535e69c74a69064e7759ff8dad86954d42b1

        SHA512

        3906ddb96b4b1b68b8c2acc940a62c856e8c3415a1b459f17cf2afc09e05751e0086f8e4e5e0ddd8e45cfb61f811bbe4dd96198db68072b45b6379c88d9ea055

      • C:\Program Files (x86)\Microsoft\Temp\EU4486.tmp\MicrosoftEdgeUpdateSetup.exe

        Filesize

        1.6MB

        MD5

        b49d269a231bcf719d6de10f6dcf0692

        SHA1

        5de6eb9c7091df08529692650224d89cae8695c3

        SHA256

        bde514014b95c447301d9060a221efb439c3c1f5db53415f080d4419db75b27e

        SHA512

        8f7c76f9c8f422e80ade13ed60f9d1fabd66fef447018a19f0398f4501c0ecc9cc2c9af3cc4f55d56df8c460a755d70699634c96093885780fc2114449784b5f

      • C:\Program Files\MsEdgeCrashpad\settings.dat

        Filesize

        280B

        MD5

        c106302f4c96824cb745b51879c875a6

        SHA1

        d42280f1c5829ef953ede7b00c2393c1c0aa631f

        SHA256

        e88eb849465e4a5356f5b1901100d63ce7905f4bda009ca3cca702254896bb0a

        SHA512

        5d2decf0ff2725894e32e4c1f84ca91734cea91906c163f337456e2e6d3a76ddcab4e1ed07e9107de1059e78dfe388ed489e2304caf218852eb996388074e3db

      • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

        Filesize

        96KB

        MD5

        ec5fbb40caf402d1655f36f5a70f0932

        SHA1

        3929f360efe0e48631e84a6fa33a54fddbc1652b

        SHA256

        a0d0c49fb158b7a5e7344af4d3b5665433db623961ef9a0f6f95e78f2210571c

        SHA512

        5c75664b070f3dbfd07569c38969aa826368bd82a4bdc82cbd449959f9e91fc46e96bf2ecc5bf7a36b5a261957a0313a307fd836bc21f1c9af25dfe72495c0f6

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncClient.dll

        Filesize

        10.6MB

        MD5

        ce762091b07a1eef5873cf2ca2ccfe46

        SHA1

        ca937fdfbeb7a3ddc8bff4c8fd90a977f818c706

        SHA256

        0216d51e7f157ac698185e2083150a1a622dd21f7466806663aaea0c14c87457

        SHA512

        c663e527e404642b7b9cd7d6b6c0299960277cb0c71769ebbd7c8e3841a0a5545f33c61481aa695c8b5a47246bb89788c70efa5341fb7c9fb2e459cbeae73eff

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncConfig.exe

        Filesize

        782KB

        MD5

        9a5a81a28a78af1e11b4bfcc1c0ff1c4

        SHA1

        9228b164fd2240c6e1d7ceb216666c5ee863d6d2

        SHA256

        2807caabb50d6c404fd89ed55bbcef17cc7f097867d25c960883d67a6f347928

        SHA512

        6432a02681441523127009cff7a0f511338041060d56a3f66caf566cf3de32a79dd9b15bdf6df5711de74d6391bd674219a6b535b97c894fe5c8a8593181c0f2

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncEvents.dll

        Filesize

        139KB

        MD5

        6793b0881f502b5c45b95b787ffa7137

        SHA1

        f1d3059ff3c53f8dca8197ce59b6f846ea26787d

        SHA256

        70e88f97b008eac45c45d41c699e421bb3cde5d6bf23c720270f7e8c92bfa4d8

        SHA512

        fb7ebbc5fe3466aa54cc94d3a57edb3f05e45c9fb46ec226b125873adb875e3618bb29e358ad6345521630990f7ba76efa8c05129bfa9527ca9d0fbcde9eef5b

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncFS.dll

        Filesize

        886KB

        MD5

        15dbe04329abd84b195e45c3fe81da5e

        SHA1

        202b2308e0c082cbbba9bd68dbcf2957207fdee2

        SHA256

        0eb306e3e5ae724d747ee92ffb029ed6faafcf8b36684537e6976cf50b9a0a45

        SHA512

        bc9bf1e690fe1942ed3e9416afdaf92f8bea6a5de0dbde7cce8eaf8dd8638f31c4624f2defbbaa38758f5b4e2d8b1f6fd7b38b53cbeaf9719b1b63af7c2f2f08

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncHost.dll

        Filesize

        447KB

        MD5

        2638c0e13945eeb75e266c1f51a140d2

        SHA1

        6f741f5990f0c9729d4f11c478ac160a18d3f099

        SHA256

        0a261a94cfc32a4fcb8cae9ea191d9bca40031f0d93822d639884ee0ec3bd135

        SHA512

        cb0a6f618f6358d5f90325b432600391ed527628b0c0a891b29a33c953f15fa62c9cdfdac87b17de6d3cc571b69237353e1adf2e6f2901927c975f90b0f5fa24

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncRNWin32Lib.dll

        Filesize

        329KB

        MD5

        2e03813f24a885a2e8cc16e3f336d8ed

        SHA1

        ddb2db7511eee4a16351f7862d49cf5197566c88

        SHA256

        0183d2065e0b6148697968b73f2abd100a0e30f0d280d74299cdab69321439ed

        SHA512

        6b5508ee231788dcd1d38c9a1b9eed9910364c9369a187f03c0d5c78d35647d0d8f4c05d79077994353d35b1f2aa85e7c59e5ecf25ce9a5a6499dc74f5f109f4

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\FileSyncTelemetryExtensions.dll

        Filesize

        472KB

        MD5

        a5fb1cefd0b47fc249373d35b9adf43f

        SHA1

        fbbde165c9185916ebe4fc51ac49bd9cca14d919

        SHA256

        16ecdba01cb869e4db022a27097f6ab9aace7590aa0d9ac4a8c10ddae7683d3d

        SHA512

        d02ce6566236bde1dea9b615cabefb189f236a075eb8a01a102653e5fb67684c47f32cc65f5cf2377023b8d076549f67c52803bbf8776f5c1a5c4d7854e6877d

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LoggingPlatform.dll

        Filesize

        646KB

        MD5

        26c10167cd870920a734cd37eb841bb5

        SHA1

        4187c3932755f9aa82844d79569d099ba9a6d524

        SHA256

        194f07c167910fba8b999edbe7209d133282f8230b59484bbd0377f68a68eb06

        SHA512

        d96def3c3b95bd56bbb45b71e6ab417c8041603049b4669ec976ad744c0b351b601fd2d547a6f344d5628cb5d88994ca7ed3baad9e6e9bc233a63ddfa5676288

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

        Filesize

        1KB

        MD5

        72747c27b2f2a08700ece584c576af89

        SHA1

        5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

        SHA256

        6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

        SHA512

        3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

        Filesize

        1KB

        MD5

        b83ac69831fd735d5f3811cc214c7c43

        SHA1

        5b549067fdd64dcb425b88fabe1b1ca46a9a8124

        SHA256

        cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

        SHA512

        4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

        Filesize

        2KB

        MD5

        771bc7583fe704745a763cd3f46d75d2

        SHA1

        e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

        SHA256

        36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

        SHA512

        959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

        Filesize

        2KB

        MD5

        09773d7bb374aeec469367708fcfe442

        SHA1

        2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

        SHA256

        67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

        SHA512

        f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

        Filesize

        6KB

        MD5

        e01cdbbd97eebc41c63a280f65db28e9

        SHA1

        1c2657880dd1ea10caf86bd08312cd832a967be1

        SHA256

        5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

        SHA512

        ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

        Filesize

        2KB

        MD5

        19876b66df75a2c358c37be528f76991

        SHA1

        181cab3db89f416f343bae9699bf868920240c8b

        SHA256

        a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

        SHA512

        78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

        Filesize

        3KB

        MD5

        8347d6f79f819fcf91e0c9d3791d6861

        SHA1

        5591cf408f0adaa3b86a5a30b0112863ec3d6d28

        SHA256

        e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

        SHA512

        9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

        Filesize

        3KB

        MD5

        de5ba8348a73164c66750f70f4b59663

        SHA1

        1d7a04b74bd36ecac2f5dae6921465fc27812fec

        SHA256

        a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

        SHA512

        85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

        Filesize

        4KB

        MD5

        f1c75409c9a1b823e846cc746903e12c

        SHA1

        f0e1f0cf35369544d88d8a2785570f55f6024779

        SHA256

        fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

        SHA512

        ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

        Filesize

        8KB

        MD5

        adbbeb01272c8d8b14977481108400d6

        SHA1

        1cc6868eec36764b249de193f0ce44787ba9dd45

        SHA256

        9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

        SHA512

        c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.scale-100.png

        Filesize

        2KB

        MD5

        57a6876000151c4303f99e9a05ab4265

        SHA1

        1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

        SHA256

        8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

        SHA512

        c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.scale-125.png

        Filesize

        4KB

        MD5

        d03b7edafe4cb7889418f28af439c9c1

        SHA1

        16822a2ab6a15dda520f28472f6eeddb27f81178

        SHA256

        a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

        SHA512

        59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.scale-150.png

        Filesize

        5KB

        MD5

        a23c55ae34e1b8d81aa34514ea792540

        SHA1

        3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

        SHA256

        3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

        SHA512

        1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.scale-200.png

        Filesize

        6KB

        MD5

        13e6baac125114e87f50c21017b9e010

        SHA1

        561c84f767537d71c901a23a061213cf03b27a58

        SHA256

        3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

        SHA512

        673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveMedTile.scale-400.png

        Filesize

        15KB

        MD5

        e593676ee86a6183082112df974a4706

        SHA1

        c4e91440312dea1f89777c2856cb11e45d95fe55

        SHA256

        deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

        SHA512

        11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

        Filesize

        783B

        MD5

        f4e9f958ed6436aef6d16ee6868fa657

        SHA1

        b14bc7aaca388f29570825010ebc17ca577b292f

        SHA256

        292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

        SHA512

        cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

        Filesize

        1018B

        MD5

        2c7a9e323a69409f4b13b1c3244074c4

        SHA1

        3c77c1b013691fa3bdff5677c3a31b355d3e2205

        SHA256

        8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

        SHA512

        087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

        Filesize

        1KB

        MD5

        552b0304f2e25a1283709ad56c4b1a85

        SHA1

        92a9d0d795852ec45beae1d08f8327d02de8994e

        SHA256

        262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

        SHA512

        9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

        Filesize

        1KB

        MD5

        22e17842b11cd1cb17b24aa743a74e67

        SHA1

        f230cb9e5a6cb027e6561fabf11a909aa3ba0207

        SHA256

        9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

        SHA512

        8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

        Filesize

        3KB

        MD5

        3c29933ab3beda6803c4b704fba48c53

        SHA1

        056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

        SHA256

        3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

        SHA512

        09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.scale-100.png

        Filesize

        1KB

        MD5

        1f156044d43913efd88cad6aa6474d73

        SHA1

        1f6bd3e15a4bdb052746cf9840bdc13e7e8eda26

        SHA256

        4e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816

        SHA512

        df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.scale-125.png

        Filesize

        2KB

        MD5

        09f3f8485e79f57f0a34abd5a67898ca

        SHA1

        e68ae5685d5442c1b7acc567dc0b1939cad5f41a

        SHA256

        69e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3

        SHA512

        0eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.scale-150.png

        Filesize

        3KB

        MD5

        ed306d8b1c42995188866a80d6b761de

        SHA1

        eadc119bec9fad65019909e8229584cd6b7e0a2b

        SHA256

        7e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301

        SHA512

        972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.scale-200.png

        Filesize

        4KB

        MD5

        d9d00ecb4bb933cdbb0cd1b5d511dcf5

        SHA1

        4e41b1eda56c4ebe5534eb49e826289ebff99dd9

        SHA256

        85823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89

        SHA512

        8b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\OneDriveSmallTile.scale-400.png

        Filesize

        11KB

        MD5

        096d0e769212718b8de5237b3427aacc

        SHA1

        4b912a0f2192f44824057832d9bb08c1a2c76e72

        SHA256

        9a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef

        SHA512

        99eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\LogoImages\Resources.pri

        Filesize

        18.1MB

        MD5

        4fbd1578d8beef2787c69a650c6e18a9

        SHA1

        51c7bfd3d23b7aaef7f6f9fa16f816714900c7e9

        SHA256

        2d9961faa1b5b8018f803a74c8e83c0036eed830fbe70fc9c57320bd8cddf1cf

        SHA512

        ab82c867dad53c2c839c16f031d97ebe9ba691be9ae0d9aed6370d34cd43594330f8167bc1e1a2dbfc99848a30aea5f6d3532590a263d4248db72319a26a3f00

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\OneDrive.VisualElementsManifest.xml

        Filesize

        344B

        MD5

        5ae2d05d894d1a55d9a1e4f593c68969

        SHA1

        a983584f58d68552e639601538af960a34fa1da7

        SHA256

        d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c

        SHA512

        152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\OneDrive.exe

        Filesize

        4.7MB

        MD5

        f83c519bafc1f92012005ea8d6c2638a

        SHA1

        8931607fd64580adb03b6088ab2fd1b410dc2132

        SHA256

        d63d180f84c8fc7b34fed95e838c025bba44a0cac18777b5582c01f4ae356207

        SHA512

        4883632e64651269cb279335f6a185dc6bf353cbe69c6f0984d5c5c8d6713918c0760357ebcfe6bb64ed7791574df59b221a84642390ac0f05a79b964bc6d330

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\OneDriveStandaloneUpdater.exe

        Filesize

        4.0MB

        MD5

        cb32f4c57c0a09f1fde92dd7ccb022c5

        SHA1

        26e9370af926369e6ac456f1d029bdec538239f3

        SHA256

        bf861f5bd384707e23148716240822208ceeba50c132fb172b784a6575e5e555

        SHA512

        445b2f3fa76013e2cbd11371b397ee57f7837908133594a79d8e764417fb3a3ba367e4f807685bb61324a23d2a7ba1ce6b86bf17d1046b8fd4f4a141a9be380b

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\OneDriveTelemetryStable.dll

        Filesize

        2.2MB

        MD5

        f822197330dff32995f16a2eb431480f

        SHA1

        56592e098f294b86fdb752c6b491206e50d3ad64

        SHA256

        8954efe40c929c33741ce211bb14511d4dd47e0caf9813aed3746645bdb184f0

        SHA512

        f3e4942eb0ef93c29ba786ec9ace36b749c710744e1f3ada4d1e230c35e9c3a984cd398f84a59c3f6ca36172e1acdfa4234006a10be84f02d938830d00f2c310

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\Telemetry.dll

        Filesize

        996KB

        MD5

        cd7c9d058aee19cf91cdfcd144ff79e6

        SHA1

        48d8eb7e7f6a1a6a9b592323a212273e3a5d5e87

        SHA256

        44618801ef0d15721d3c2e87edb1dd2136971b84f811c43e90402fd3238c0251

        SHA512

        5ec6383087810c51b65c8a7e86360213b0c64deee15751626ec892c4355f4d3e4336f056052575c48eea29193bace5e3da142b14c9a6c58db4b62ab2939db592

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\UpdateRingSettings.dll

        Filesize

        629KB

        MD5

        72273505986d8a973aab58753a9a049e

        SHA1

        9b6b51b8bead46cd6a89253e9722d447e4ef70c4

        SHA256

        029fe60df36b90aa300770218302fcffd8ce1bda4b43d1c8c4a734d14e0cfc85

        SHA512

        b42d60b524e729ea456fb77f9edcde07fa234e1fbc2d10ffc9f2592aa9cc95157747e29d6b62f9f8326603301354f9a7d1695b5dfbe15e90365013f0a5fb8e06

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\msvcp140.dll

        Filesize

        557KB

        MD5

        5ba06ea21e0ba0b120f3612c6203be35

        SHA1

        6b38acb8f4b4f202eeea0c388712b2c75e657fd6

        SHA256

        e70a816aac7a38fd02f60e8b2d7d737f0ed43f059abfaa5788ed2943003239e1

        SHA512

        7b4535350488c09adabd15d8e3a4d2a968632d9d8b720365d4aeb4b8c262a728dca7460a924f39e2e461fde560d3482d29a25dbebee2eb073652c7e639da4a7d

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\pa-Arab-PK\localizable.json

        Filesize

        4B

        MD5

        c443b04d0fc26b0a5a4573a78e0082a1

        SHA1

        3c957535345645dce7190b85eb10b39da96b2518

        SHA256

        e3566b3a06430868d71e9287dfd6c6c520a3da027aabea01951d407ee131dc2f

        SHA512

        7bbf6dac485c9e59d02edabc91ff5b15bc1319cef6905c0077ee16e3b1f572b61bff85f2400bc0f5b4aeab0260bd5d68787d72c7a688d79192952f7957a44de3

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\ucrtbase.dll

        Filesize

        1.1MB

        MD5

        ff45246d2d557fe20f190841b5845522

        SHA1

        992180b9e283a0ee26e374ed8e66a5d9325ea351

        SHA256

        4d147c809638b6af98bbada8d9f8e9d36091259b418ac65dd5b92a404b746ac3

        SHA512

        9117b4b8447f02be0d7a15b15a371231c435f5af4710af6cc3db2c6079e694ca274cef8220c1a4eb3976087da529d13d8660f7d76e61daace609748d7650313e

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\vcruntime140.dll

        Filesize

        96KB

        MD5

        e7e30bb38a404c386a2ac7ba9ee43b19

        SHA1

        f383dd93778153b7d2727b5147864c147e516f42

        SHA256

        91068e7b5e708f871cc0e0b85ef4132d6b24c39c9ff4efcae7613f3a5d1e9342

        SHA512

        48855d85a2b8bdab565bd72a321b7a714bd54ba224da02ba30899f4cb15c5212bec8d825c6654e741e7eeaf6aa813beff625439d3271487b5604780aa1f454fa

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.211.1020.0001\vcruntime140_1.dll

        Filesize

        37KB

        MD5

        b74bf21d9393a9843c759188060dfa38

        SHA1

        d7af133844d228afd136e388990472899234433e

        SHA256

        6c45d5948249dc2a46e2d40f9213f5a8ec3d5fb4c8ccaa96d380c0e50357ab8d

        SHA512

        1ae229b14fe673c1a50160f5ad4a1bcf7ab7371f79cf255a5ae0ea76d5732c17e39e133fcf1c3add8ef61a9e28da320c68b59c6f51fd11cb76b5f45c98c48afb

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\Assets\Square44x44Logo.altform-unplated_targetsize-16.png

        Filesize

        637B

        MD5

        b735ac2c67ff5335bd4215e4907abf32

        SHA1

        39d32221ec712532042f9175d83598ef0e842394

        SHA256

        3234a95ab229383eafa6f4036d6e5bcccdf441511fc86b83e5a8a8de2df9bd40

        SHA512

        8ec1bebeaee2dcafac2013c833eaf6da6123830e5a4d86dda722d9a26263c44c38fa603eb1ea43195010e31f6687142956324d274e2de9d8923774da5d3a4e68

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\Assets\Square44x44Logo.altform-unplated_targetsize-24.png

        Filesize

        1000B

        MD5

        1433673065290ad7497f1559b99528e2

        SHA1

        70169b46ff0dcffca74e3978206b9650bd5f4b31

        SHA256

        7fd2eba3f94391b2894a0fde79d3c09a253b371e258ab48aeb13320ac2d7321f

        SHA512

        60459ef7a11867f92970be857972ca24d5ca7507047898dbad1537cff3c04a67dc9c83bcfafa16917175d01da7376e7eff9288c8b6334a384df356fa70b87494

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\Assets\Square44x44Logo.altform-unplated_targetsize-256.png

        Filesize

        18KB

        MD5

        65e01ff43c980fc95ed04e60e7cc8132

        SHA1

        686c9751958e05fc180117542b5f1d9ae7bd6fcd

        SHA256

        4a4f966db5813b27a8217adb9a5d8b1d62dd00dad83261650d2f4ae3b6a02d01

        SHA512

        89dd2e9db684f6b68a0ec1766654019e7809c6423e90e85977dd2270e1f685c8b7afeb13fe5aff0cc21dd21d491f21c32ec0ea2480834b6f11b54d867c1cc696

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\Assets\Square44x44Logo.altform-unplated_targetsize-32.png

        Filesize

        1KB

        MD5

        3685995d9d28d9633cd4610e86a387c2

        SHA1

        bd5fef5096b4f947ff1bada0a900d1fca0e4b221

        SHA256

        2b515f953b65863e521b66c9ce37dd8756602823d2e0415bf6898a1e7c7bc55d

        SHA512

        4b07e829dc0c10f2216bea916fe2185f751385c5f389c30f5b4d15626f3c069a58137e8e863f88d1989a3907f22181103f01c3d601660970843a2857e5099e24

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\Assets\Square44x44Logo.altform-unplated_targetsize-48.png

        Filesize

        2KB

        MD5

        7f87b385d14233279ddbf44ae53d1345

        SHA1

        6aadef638a9bf41dcad3e1ce18fd3dc4cc695fa2

        SHA256

        24587df3a9381bf22922c5c194d828492f48287c97a42791305a4dbf62d145fd

        SHA512

        e0f42dab68b9fee96edfb6547232caf225acba8d02970bbc0164457eac130510f5c987eedc08f829aff06dd78ce2e64250fbfeb69d8c754af33996c39ead6d14

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\FileSyncConfig.exe

        Filesize

        782KB

        MD5

        6a690e03b527d2fdd8f71d5c7c138406

        SHA1

        f2af86f204a3e32e92c6ea37dc53f68cbc83334f

        SHA256

        eba63da557e0955cd08c9ec82cbdff06a7746cf886892c549a905594b9d6b58a

        SHA512

        6ea38735eb45e3c57f77cb7807a78ae7853d6c8dab6b4cf9028ea8ff0442d64b1868f217243ad5ec6eaa7f3e92837094030615592d3df806038779b057c57b3f

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\OneDrive.exe

        Filesize

        4.8MB

        MD5

        04a15b7fc2a6bbf23b9494ee9272bdc2

        SHA1

        bdfc46d71c7722b6d53605bac6f1bc41400770ed

        SHA256

        a06f3d7b7e0734725340993c76391235512a6fe3b3c234ed1956348324808479

        SHA512

        3fc9fb305411ea61f70332c170d644270618f0aa2a647696bdfba7c3f3c0ae20470527e5e9f36160d952ca5180fbc73e23a4f74fe85008e20c98235eb815bfb0

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\24.244.1204.0003\OneDriveStandaloneUpdater.exe

        Filesize

        4.0MB

        MD5

        fb9f3f81d1df9ac038e63473ac8402a0

        SHA1

        510cc33a8d9771f05cb422a5fb7df278c8b2c83d

        SHA256

        32aa72207e3aadbf1eb9e832f17e89c6206a7b156aa67c14e6e6135600407dde

        SHA512

        bfbb343bb58990285e061083de8017945188d9856177e6f89b358e790b69dce625d19c02a9b5df5af5faa3772a9741c20489ae60266f28382b2c4b741cea9ee1

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\ListSync\Business1\settings\Microsoft.ListSync.Settings.db

        Filesize

        16KB

        MD5

        9caed8c96174ed88142f7436e5510143

        SHA1

        7f63c366f1326b142a767d92899a4943a014d7cc

        SHA256

        e1b72fdb6fb9da58322f43b4ac4d23a84be5800fefd87fea07b6895ce091fea6

        SHA512

        94f50b56085a5ee5638b9651fd9d8674dd90da1cffddc4ae5b8c3e86d915f6e4d71d461254c4ea16e9b3f4659bcc83c03b5013a3ac89924a6d324272d5fc4407

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

        Filesize

        108B

        MD5

        205516294726527cc5f87e79bf004366

        SHA1

        90520050e536406dfad56c543068304388e16c66

        SHA256

        434f3de61c4b0688782deb1eaeffaa8eeca17ae52d342ca804ba4d67d22f120f

        SHA512

        056ef0f359281544e8d7869e3ddf04f2a6ae5575f83ed9c178f40dab4bf13f7755e09ac2d7adb45647a2f49d0434265ef963f01fada7db04bdf274966d13d63e

      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

        Filesize

        88KB

        MD5

        dc58aabc98e14496a754894185a20519

        SHA1

        1a9a1fd95edf9e180532bb0fcab53969f2c8fcbd

        SHA256

        b0d842c04507907384e659a0c0b1155b8bedb9ebac5f59d530dfc71309e51b65

        SHA512

        7529a282c477cc3e945e256be36114473e8ea25dfe64b8d47538c8807b0c213a6093d38c015b4afcd0781034c6880aba8e6d947432ea9a45c7f3aa01ed5014a3

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\1521f696d8626c8e8127c0284ab987ff1974f39a.tbres

        Filesize

        2KB

        MD5

        b5f6e1a822c21968c7ce9207a54872e1

        SHA1

        21d2db870bd63a85cfc1e950e0038250c0215764

        SHA256

        f80ee8c27b16e4df19144f8c841c7baf52a66050c9a69691a9a155d4bb14ca5d

        SHA512

        80363738be35af7f544814c27c5a294ad11b70ca31c1f019bc94491ff6bcbe9f8226e0ff863d4ae0764d438c74f1d7324c53d040907f3319ccc453eb2ffbe9c4

      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\78c091ac6d34daa9d603629dd088840de549030f.tbres

        Filesize

        2KB

        MD5

        78124ca96c664c350ed9216163d76ea7

        SHA1

        7c604eec57e110ac6c80512c9db701a74cb4624f

        SHA256

        bff145a565ad2bfbabd124c36ba960d9416e4695f203b7f90c7b0ab3e32b45f7

        SHA512

        07b5879708310c651bcfa0dcfcd8745a936079da9e07b8c02e2c3a7b5ced32d8f60861404a86b2a884b6a98ab9b3ca6edab316422132c53faa904c70f84db8bc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H693S724\620d466ec7616ee4cd28bf4512f7f7cd8043e015[1].xml

        Filesize

        2KB

        MD5

        dd2c9a225c2c0aa4128d7cd0fe6714bc

        SHA1

        090aec568265a96e93542abc990354ea74cc92d6

        SHA256

        756d24406627e05029b8b27f41c21a9d30e697de6d05e97137318e79c7d5fde9

        SHA512

        3776dd1431ce90caa9a9549017c3f771d41931c93328722dda88482a546ea399550fdb11e848d3885b7c0ee01ffe1787aff18a689c370f7ca0ba79ad34f9a0a2

      • C:\Users\Admin\AppData\Local\Temp\MSIB815.tmp

        Filesize

        816KB

        MD5

        aa88d8f40a286b6d40de0f3abc836cfa

        SHA1

        c24eab9e4b10b159b589f4c3b64ef3db111ea1c8

        SHA256

        8d633efeda1249356b11bf8f46583242356e4f903056b53bd25a99511d1790a1

        SHA512

        6c2f2f6a2d66015f30158962d653e381136f0f30023380a0ce95bd0944d856113fbde65db52dbb3b5de1c0e2edf2cd53184e721c64b916834be4198c61224519

      • C:\Users\Admin\AppData\Local\Temp\MSIBCEC.tmp

        Filesize

        877KB

        MD5

        6a639b68fe7f4e67b7510af13403772b

        SHA1

        255ba543d6fdd8f037823ff321ec00abe3575c54

        SHA256

        7118cd0d6956c84dc8ede10db84491d7884bfb0baa4a0ab96afc7eea47f46dd0

        SHA512

        43cfa4cdf669df71d7da59669ec9653c4facba4c2e6fe52deada469116b5c8b63a927a9ddc2f240ca9e1a2cc4335c12936007662bf47cd11c7e61392af219cef

      • C:\Users\Admin\AppData\Local\Temp\wct46D8.tmp

        Filesize

        475B

        MD5

        42cec95d524ca21b18130cc365f3c8f1

        SHA1

        c740f5f284a3453a190e96e33a0608c8265ab7ab

        SHA256

        b7bdf828cc4063f32dec7b7350ca0c309d528efde8a38d43f66cedac6dc345df

        SHA512

        8e4544acc8fc69e13560c45bf1148b2a6ef1d7327932859573f4b2e693400dc4061a673f24ce70de355d99f4109dbdb131ef5640f00bbff79f6c92484966b3a7

      • C:\Users\Admin\AppData\Local\Temp\wctFEED.tmp

        Filesize

        475B

        MD5

        9cec3ee606bae8a7389e4a6b8341b408

        SHA1

        e8af7d392b01a829bc40da55818f5943895c721b

        SHA256

        f5cde8493777906dbc7c3f12360f95ceafba4b5d4a13229b612714c8da6fed5e

        SHA512

        e6e3d87bb1620ad58adff5bc9d286edfe562d445d8e9f86f46cf57064e929b917b1c54aa59a5194c5d8af10de262101de4a559a689646360d679b9a84e773509

      • memory/1240-1666-0x0000017324630000-0x0000017324849000-memory.dmp

        Filesize

        2.1MB

      • memory/1240-1660-0x0000017324630000-0x0000017324849000-memory.dmp

        Filesize

        2.1MB

      • memory/1240-1662-0x0000017324630000-0x0000017324849000-memory.dmp

        Filesize

        2.1MB

      • memory/1240-1663-0x0000017324630000-0x0000017324849000-memory.dmp

        Filesize

        2.1MB

      • memory/1240-1661-0x0000017324630000-0x0000017324849000-memory.dmp

        Filesize

        2.1MB

      • memory/1664-1334-0x000001D48B0D0000-0x000001D48B619000-memory.dmp

        Filesize

        5.3MB

      • memory/1664-1582-0x000001D48B0D0000-0x000001D48B619000-memory.dmp

        Filesize

        5.3MB

      • memory/2868-1584-0x0000000072980000-0x0000000072BA6000-memory.dmp

        Filesize

        2.1MB

      • memory/2868-2025-0x0000000072980000-0x0000000072BA6000-memory.dmp

        Filesize

        2.1MB

      • memory/2868-1583-0x00000000003B0000-0x00000000003E5000-memory.dmp

        Filesize

        212KB

      • memory/2868-3045-0x00000000003B0000-0x00000000003E5000-memory.dmp

        Filesize

        212KB

      • memory/5420-3009-0x0000025FBED00000-0x0000025FBF975000-memory.dmp

        Filesize

        12.5MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.