Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/02/2025, 22:29 UTC
250226-2epdjsvygx 1026/02/2025, 21:48 UTC
250226-1nyg5stzdt 1021/02/2025, 20:45 UTC
250221-zjsweszqar 10Analysis
-
max time kernel
727s -
max time network
696s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 22:29 UTC
Behavioral task
behavioral1
Sample
brain.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
brain.exe
Resource
win10v2004-20250217-en
General
-
Target
brain.exe
-
Size
147KB
-
MD5
448f1796fe8de02194b21c0715e0a5f6
-
SHA1
935c0b39837319fda571aa800b67d997b79c3198
-
SHA256
eb82946fa0de261e92f8f60aa878c9fef9ebb34fdababa66995403b110118b12
-
SHA512
0b93b2c881b1351ff688089abf12bbfcff279c5d6ca8733d6d821c83148d73c85cfedf5ab5bc02c2145970124b518551db3a9fc701d8084f01009ae20f71a831
-
SSDEEP
3072:l6glyuxE4GsUPnliByocWep0yjEJ3hDRMK89nB2:l6gDBGpvEByocWeebbMjV4
Malware Config
Extracted
C:\sYMY1N6ah.README.txt
braincipher
brain.support@cyberfear.com
http://mybmtbgd7aprdnw2ekxht5qap5daam2wch25coqerrq2zdioanob34ad.onion
Signatures
-
Brain Cipher
Ransomware family based on Lockbit that was first observed in June 2024.
-
Braincipher family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation D88D.tmp -
Deletes itself 1 IoCs
pid Process 3588 D88D.tmp -
Executes dropped EXE 1 IoCs
pid Process 3588 D88D.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1294999112-580688058-1763548717-1000\desktop.ini brain.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1294999112-580688058-1763548717-1000\desktop.ini brain.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 3588 D88D.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D88D.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3140 vlc.exe 2872 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe 4852 brain.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3140 vlc.exe 2872 vlc.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp 3588 D88D.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeDebugPrivilege 4852 brain.exe Token: 36 4852 brain.exe Token: SeImpersonatePrivilege 4852 brain.exe Token: SeIncBasePriorityPrivilege 4852 brain.exe Token: SeIncreaseQuotaPrivilege 4852 brain.exe Token: 33 4852 brain.exe Token: SeManageVolumePrivilege 4852 brain.exe Token: SeProfSingleProcessPrivilege 4852 brain.exe Token: SeRestorePrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSystemProfilePrivilege 4852 brain.exe Token: SeTakeOwnershipPrivilege 4852 brain.exe Token: SeShutdownPrivilege 4852 brain.exe Token: SeDebugPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeBackupPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe Token: SeSecurityPrivilege 4852 brain.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 3140 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe 2872 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3140 vlc.exe 2872 vlc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4852 wrote to memory of 3588 4852 brain.exe 96 PID 4852 wrote to memory of 3588 4852 brain.exe 96 PID 4852 wrote to memory of 3588 4852 brain.exe 96 PID 4852 wrote to memory of 3588 4852 brain.exe 96 PID 3588 wrote to memory of 1168 3588 D88D.tmp 97 PID 3588 wrote to memory of 1168 3588 D88D.tmp 97 PID 3588 wrote to memory of 1168 3588 D88D.tmp 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\brain.exe"C:\Users\Admin\AppData\Local\Temp\brain.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\ProgramData\D88D.tmp"C:\ProgramData\D88D.tmp"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\D88D.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\PushEnable.mpa"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3140
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\PushEnable.mpa"1⤵PID:4992
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\PushEnable.mpa"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2872
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RequestUnprotect.mpa"1⤵PID:3400
Network
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.28.10ax-0001.ax-msedge.netIN A150.171.27.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418566_1KUOCUMD7VRU52NBF&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418566_1KUOCUMD7VRU52NBF&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 344530
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: FE6AFAD712AC4CE2B182A2B10D59EE80 Ref B: FRA31EDGE0711 Ref C: 2025-02-26T22:30:04Z
date: Wed, 26 Feb 2025 22:30:04 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418565_1OUCQO7VP7RV95UTY&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418565_1OUCQO7VP7RV95UTY&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 436830
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 9CDAD6D01EF94702B21D5AF1D4F0CAFC Ref B: FRA31EDGE0711 Ref C: 2025-02-26T22:30:04Z
date: Wed, 26 Feb 2025 22:30:04 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418545_11VT5XTZM3TEDIRSP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418545_11VT5XTZM3TEDIRSP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 663266
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DC2246B834A44765964C51EECBB511E4 Ref B: FRA31EDGE0214 Ref C: 2025-02-26T22:30:33Z
date: Wed, 26 Feb 2025 22:30:32 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 675918
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: FA2C94434B244A1EBB6FE3CB09B83604 Ref B: FRA31EDGE0214 Ref C: 2025-02-26T22:30:33Z
date: Wed, 26 Feb 2025 22:30:32 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239356742545_1KNYU9T4JPR3SHFV1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239356742545_1KNYU9T4JPR3SHFV1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 581101
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E1747362C2EF4E41B8EF026BD44A8980 Ref B: FRA31EDGE0214 Ref C: 2025-02-26T22:30:33Z
date: Wed, 26 Feb 2025 22:30:32 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301592_19S8DNJJK87B8889G&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239317301592_19S8DNJJK87B8889G&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 880886
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: EE0D90B38B0E419FAD01F0E20F1556CB Ref B: FRA31EDGE0214 Ref C: 2025-02-26T22:30:33Z
date: Wed, 26 Feb 2025 22:30:32 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301183_1Q7FZ9HQ4P9RCH5CO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239317301183_1Q7FZ9HQ4P9RCH5CO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 706813
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 553BE911A0D24BE9853AD85ED4705FE6 Ref B: FRA31EDGE0214 Ref C: 2025-02-26T22:30:33Z
date: Wed, 26 Feb 2025 22:30:32 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418546_1PNT9LCA42P8D0DO5&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.28.10:443RequestGET /th?id=OADD2.10239340418546_1PNT9LCA42P8D0DO5&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 635249
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DF39E3B4C7C84FF88E69FF9ED1AC06C7 Ref B: FRA31EDGE0214 Ref C: 2025-02-26T22:30:37Z
date: Wed, 26 Feb 2025 22:30:37 GMT
-
Remote address:8.8.8.8:53Requestupdate.videolan.orgIN AResponseupdate.videolan.orgIN A213.36.253.119
-
Remote address:213.36.253.119:80RequestGET /vlc/status-win-x64 HTTP/1.1
Host: update.videolan.org
Accept: */*
Accept-Language: en_US
User-Agent: VLC/3.0.20 LibVLC/3.0.20
Range: bytes=0-
ResponseHTTP/1.1 206 Partial Content
Date: Wed, 26 Feb 2025 22:31:16 GMT
Content-Type: application/octet-stream
Content-Length: 528
Connection: keep-alive
Last-Modified: Thu, 02 Nov 2023 00:26:19 GMT
ETag: "6542ecab-210"
Content-Range: bytes 0-527/528
X-Clacks-Overhead: GNU Terry Pratchett
Strict-Transport-Security: max-age=31536000
-
Remote address:213.36.253.119:80RequestGET /vlc/status-win-x64.asc HTTP/1.1
Host: update.videolan.org
Accept: */*
Accept-Language: en_US
User-Agent: VLC/3.0.20 LibVLC/3.0.20
Range: bytes=0-
ResponseHTTP/1.1 206 Partial Content
Date: Wed, 26 Feb 2025 22:31:16 GMT
Content-Type: application/octet-stream
Content-Length: 195
Connection: keep-alive
Last-Modified: Thu, 02 Nov 2023 00:26:19 GMT
ETag: "6542ecab-c3"
Content-Range: bytes 0-194/195
X-Clacks-Overhead: GNU Terry Pratchett
Strict-Transport-Security: max-age=31536000
-
GEThttps://www.bing.com/th?id=OADD2.10239414284817_1UVYYSBXC4CID8KBL&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90Remote address:92.123.128.135:443RequestGET /th?id=OADD2.10239414284817_1UVYYSBXC4CID8KBL&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/jpeg
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QWthbWFp"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 1981
date: Wed, 26 Feb 2025 22:40:06 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.8b777b5c.1740609606.e9be43d
-
150.171.28.10:443https://tse1.mm.bing.net/th?id=OADD2.10239340418565_1OUCQO7VP7RV95UTY&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90tls, http228.5kB 815.1kB 601 596
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418566_1KUOCUMD7VRU52NBF&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418565_1OUCQO7VP7RV95UTY&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200 -
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
150.171.28.10:443https://tse1.mm.bing.net/th?id=OADD2.10239340418546_1PNT9LCA42P8D0DO5&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90tls, http2148.3kB 4.3MB 3163 3154
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418545_11VT5XTZM3TEDIRSP&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239356744296_15VBZP2MRT6FYDL3E&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239356742545_1KNYU9T4JPR3SHFV1&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301592_19S8DNJJK87B8889G&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301183_1Q7FZ9HQ4P9RCH5CO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418546_1PNT9LCA42P8D0DO5&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 6.9kB 15 11
-
385 B 1.1kB 5 4
HTTP Request
GET http://update.videolan.org/vlc/status-win-x64HTTP Response
206 -
389 B 727 B 5 4
HTTP Request
GET http://update.videolan.org/vlc/status-win-x64.ascHTTP Response
206 -
92.123.128.135:443https://www.bing.com/th?id=OADD2.10239414284817_1UVYYSBXC4CID8KBL&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90tls, http21.5kB 7.3kB 18 14
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239414284817_1UVYYSBXC4CID8KBL&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=48&h=48&dynsize=1&qlt=90HTTP Response
200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5b4bc7308ebaeec6e1254b6c0a5169929
SHA1ec2cd2df2ab8149ce649576f4bc466feaaf5d85f
SHA256894132627e16c8db50da1f92ba14bb67bb6b9e9db9f704edab363a521628032f
SHA5122b9d37d0671ee48b0198ec08ac19fe86aba6b6c25639c84b09bcc56309d3280ef5783c09ecd9f96c581e3d0eeba73a9bff46755b3aa64b6d5df20862e3eda426
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\f320adc4-3786-4397-9df7-d98fd563b504.down_data
Filesize144KB
MD5fe5e517b2fd335739390f6d18286f56c
SHA1ab734536b4fefa07643e4b4d2aa8ef97b27d833b
SHA256e2839e99e893283d7671e206269386568b3ceb475a36d30616d499b35395b562
SHA5128cacf25c546ab44f34c2f1fc371a33c12e4d0194fb5b89b12b8e3e6c8c83449e42212386dff2c08b6edd400d83b90004e14701979ae41f3f6af5835394b2fff3
-
Filesize
147KB
MD59ba07338397807a91db98cb49c984cad
SHA124ec4d75cf9e10089a30e893db261870652bc9a7
SHA256ca8d37ba0674a89ffbebdba368a7b4a7c067ee40e65453ca9551e31b6615c040
SHA5121e9758110e265e89c7f2859b2e6c4e3d1f5b8397183b3c1ff867e272370ed9cef1a1d660c8ebbdc78d8e03db01307d4786bdbc326ae1a82f0dc18309a64ff2b8
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
530B
MD5c6e4ba2d784238b69123182b12561932
SHA1e71bdbf0b7a8fe8a45131005a91d45f2aa0827a0
SHA256275fa5d142f817c039c040851d94c28e7547238b15afd56205265834b8f76321
SHA5121fda9df2afc442f481f44977e07d9a4c9ed0c20ea4c0f57ce51e250593a0471618bc01d0721d65fb761e9094c3d5b8379ec17c70cfaac04c8e9417fe46c2b15a
-
Filesize
572B
MD5070812496ad172598e3d1ba2bdd2a301
SHA12027de0c3b38fb46a831160c4a21e530077be71f
SHA2564f69d4065a49d257c65d84bfdfb9418684abc3b46cd7c5e9cf63bb5692187750
SHA512d1131f3b405d0f3d6fc9a8d891ae4b73bbf6c65d8ac00393b1aa7efe072468c99f64ee8d1a964b8576e6911d4923a28cd3ba2f690503f63ae2de1f341c010be6
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02
-
Filesize
1KB
MD5deb2e0756d331362d57ad9fe408c4ff3
SHA1870865aad7c7cccafbca0c1f50f7eecaedbd4bf1
SHA2561ddacee1d25936970279557169037a335b362f86c3797ded625d68077bd0145c
SHA512e218624d2704517a358df0dfb794116bbeed3ad81daae8c07d5d969e61e7936ed043911008f4816d663de373fd23515219c8038dd22e5838af7df1678a0134a6
-
Filesize
129B
MD59a9a583719dfd38ed55279119c3554b8
SHA1313c0abaf0d3fe822245b2e7d76993393d7e2fe2
SHA2569af6b512765ed7eacb2699e21b3a3a7133f2978a7040dbcea5cb72b88c49b7e9
SHA5120f6816b37e52d8f5c439c4a4ffd6140b1bd66aba77bafae1be2bb3ba1aca5e43551a527b2ec4e1c579d6892c62c196c7fc5d89ba8aa2f7a2a7d5378b9861b7e8