Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pid.kvai.exe

Overview

General Information

Sample name:pid.kvai.exe
Analysis ID:1636350
MD5:092821eac13a978f097d6e3bd38de352
SHA1:7fd2dc3d8ba72f1f5ff13f43fcc8d80ff029f416
SHA256:7e7a368e5b866771e2d89216a7f4380aca6ca2e66dd14682721dcf4b6da0fc45
Tags:exeuser-2huMarisa
Infos:

Detection

Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Infects executable files (exe, dll, sys, html)
Infects the VBR (Volume Boot Record) of the hard disk
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
PE file contains section with special chars
PE file has nameless sections
Protects its processes via BreakOnTermination flag
Writes directly to the primary disk partition (DR0)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Userinit Child Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • pid.kvai.exe (PID: 7916 cmdline: "C:\Users\user\Desktop\pid.kvai.exe" MD5: 092821EAC13A978F097D6E3BD38DE352)
    • rundll32.exe (PID: 7580 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\UserLanguageProfileCallback.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7664 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\winethc.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7768 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\PickerPlatform.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8368 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\sechost.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 8600 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\txfw32.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3568 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\provengine.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4436 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\tvratings.dll MD5: EF3179D498793BF4234F708D3BE28633)
    • userinit.exe (PID: 9576 cmdline: "C:\Windows\system32\userinit.exe" MD5: 47BBDBE152A597F4A840C5269ED961E8)
      • explorer.exe (PID: 9592 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
    • rundll32.exe (PID: 9772 cmdline: "C:\Windows\System32\rundll32.exe" C:\Windows\system32\XboxNetApiSvc.dll MD5: EF3179D498793BF4234F708D3BE28633)
  • msedge.exe (PID: 8256 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=528882 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 8544 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 1880 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6556 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 1948 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6756 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • identity_helper.exe (PID: 6272 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8344 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416)
    • identity_helper.exe (PID: 1684 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8344 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416)
    • msedge.exe (PID: 9792 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-GB --service-sandbox-type=collections --mojo-platform-channel-handle=2580 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Samir Bousseaden (idea): Data: Command: C:\Windows\Explorer.EXE, CommandLine: C:\Windows\Explorer.EXE, CommandLine|base64offset|contains: , Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: "C:\Windows\system32\userinit.exe" , ParentImage: C:\Windows\System32\userinit.exe, ParentProcessId: 9576, ParentProcessName: userinit.exe, ProcessCommandLine: C:\Windows\Explorer.EXE, ProcessId: 9592, ProcessName: explorer.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: pid.kvai.exeAvira: detected
Source: pid.kvai.exeVirustotal: Detection: 69%Perma Link
Source: pid.kvai.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: pid.kvai.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49837 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49868 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.253.33.254:443 -> 192.168.2.4:49867 version: TLS 1.2
Source: pid.kvai.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: DirectXDatabaseUpdater.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: mstscax.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\vccorlib140.amd64.pdb source: vccorlib140.dll.0.dr
Source: Binary string: UPPrinterInstallsCSP.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Networking.ServiceDiscovery.DnsSd.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: AppXDeploymentClient.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: vdsldr.pdb source: pid.kvai.exe, 00000000.00000002.2611286803.0000000002D93000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: BitLockerCSP.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ntkrnlmp.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp, ntkrnlmp.exe.0.dr
Source: Binary string: BitLockerCSP.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: MFCM120.amd64.pdb8@ source: mfcm120.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140_atomic_wait.amd64.pdb source: msvcp140_atomic_wait.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: vcruntime140.dll.0.dr
Source: Binary string: Windows.UI.Input.Inking.Analysis.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: PsmServiceExtHost.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.00000000127B8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: fhshl.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: vdsldr.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2611286803.0000000002D93000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: srumsvc.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ufat.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: vcruntime140_1.dll.0.dr
Source: Binary string: msvcp120.amd64.pdb source: msvcp120.dll.0.dr
Source: Binary string: fhshl.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Networking.ServiceDiscovery.DnsSd.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140_atomic_wait.amd64.pdbGCTL source: msvcp140_atomic_wait.dll.0.dr
Source: Binary string: InputSwitch.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: mfc120.amd64.pdb source: mfc120.dll.0.dr
Source: Binary string: pcwutl.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: msclmd.pdb source: msclmd.dll.0.dr
Source: Binary string: PsmServiceExtHost.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.00000000127B8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: vcruntime140_1.dll.0.dr
Source: Binary string: MFCM120U.amd64.pdb source: mfcm120u.dll.0.dr
Source: Binary string: srumsvc.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\vccorlib140.amd64.pdbGCTL source: vccorlib140.dll.0.dr
Source: Binary string: ntkrnlmp.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp, ntkrnlmp.exe.0.dr
Source: Binary string: MFCM120U.amd64.pdb8@ source: mfcm120u.dll.0.dr
Source: Binary string: mstscax.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: pcwutl.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: vcruntime140.dll.0.dr
Source: Binary string: ufat.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: MFCM120.amd64.pdb source: mfcm120.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\MFC140JPN.amd64.pdb source: mfc140jpn.dll.0.dr
Source: Binary string: UpdateHeartbeat.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: TenantRestrictionsPlugin.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: AppXDeploymentClient.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Management.InprocObjects.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\MFC140ITA.amd64.pdb source: mfc140ita.dll.0.dr
Source: Binary string: msclmd.pdbGCTL source: msclmd.dll.0.dr
Source: Binary string: InputSwitch.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: UPPrinterInstallsCSP.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Management.InprocObjects.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: TenantRestrictionsPlugin.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: DirectXDatabaseUpdater.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp

Spreading

barindex
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfcm120u.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\vccorlib140.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc140jpn.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc140ita.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc110ita.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\msclmd.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfcm120.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc110jpn.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\msvcp140_atomic_wait.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc120.dllJump to behavior
Source: Joe Sandbox ViewIP Address: 2.22.242.11 2.22.242.11
Source: Joe Sandbox ViewIP Address: 162.159.61.3 162.159.61.3
Source: Joe Sandbox ViewIP Address: 23.200.0.9 23.200.0.9
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: global trafficHTTP traffic detected: OPTIONS /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveOrigin: https://business.bing.comAccess-Control-Request-Method: POSTAccess-Control-Request-Headers: content-typeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /crx/blobs/Ad_brx23lef_cW590ESOTTAroOhZ9si0XFJIUC52j2ILHW1VLB5ou6c0RgLWwGr1aRJJZ0WPNyiPBYgIpWfykvhKW-6BLzMRsp9ykw5f6ReBQmPpO6WB9pcSJPfykLTHDjYAxlKa5bf72z8tHS5eXuTavTP1h4WZBjSs/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_89_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: POST /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveContent-Length: 472Content-Type: application/reports+jsonUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7&response_type=id_token+code&nonce=d22a6b2b-7222-49dc-911b-88978835749d&redirect_uri=https%3a%2f%2fwww.bing.com%2forgid%2fidtoken%2fconditional&scope=openid%20email%20profile%209ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7/.default&response_mode=form_post&instance_aware=true&msafed=0&prompt=none&state=%7b%22ig%22%3a%2232ECE75CD7B940B89469DB7630896798%22%7d HTTP/1.1Host: login.microsoftonline.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://www.bing.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/SSR-extension.1e1de479ffc2b85d14c8.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.35sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 800sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=BingAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/web-worker.948ffa5ea2d441a35f55.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.35sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 800sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: workerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=BingAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: OPTIONS /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveOrigin: https://business.bing.comAccess-Control-Request-Method: POSTAccess-Control-Request-Headers: content-typeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: POST /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveContent-Length: 466Content-Type: application/reports+jsonUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: POST /undersideproactive/api/v1/trigger HTTP/1.1Host: services.bingapis.comConnection: keep-aliveContent-Length: 225X-UDSD-Features: udscomseaodp,Content-Type: application/jsonSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/microsoft.c1f2f2c818c03b7d76c6.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/vendors.cb5d86730a0bdbdd55a4.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common.41f9102ebf55f037c91d.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/experience.6956f4a50d95807c6fa7.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: POST /undersideproactive/api/v1/trigger HTTP/1.1Host: services.bingapis.comConnection: keep-aliveContent-Length: 247Content-Type: application/jsonSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: HEAD /statics/icons/favicon.ico HTTP/1.1Host: assets.msn.comConnection: keep-alivePragma: no-cacheCache-Control: no-cachesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /resolver/api/resolve/v3/config/?expType=AppConfig&expInstance=default&apptype=edgeChromium&v=20250311.398&targetScope={%22audienceMode%22:%22adult%22,%22browser%22:{%22browserType%22:%22edgeChromium%22,%22version%22:%22117%22,%22ismobile%22:%22false%22},%22deviceFormFactor%22:%22desktop%22,%22domain%22:%22ntp.msn.com%22,%22locale%22:{%22content%22:{%22language%22:%22en%22,%22market%22:%22us%22},%22display%22:{%22language%22:%22en%22,%22market%22:%22us%22}},%22os%22:%22windows%22,%22platform%22:%22web%22,%22pageType%22:%22ntp%22,%22pageExperiments%22:[%22prg-ad-ivq%22,%22prg-ad-price-trun%22,%22prg-additional-tile%22,%22prg-c-adspfpv%22,%22prg-errtoast2%22,%22prg-neutral-bg%22,%22prg-pr2-dis-signal%22]} HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&prerender=1 HTTP/1.1Host: ntp.msn.comConnection: keep-alivedevice-memory: 8sec-ch-dpr: 1sec-ch-viewport-width: 1232sec-ch-viewport-height: 910rtt: 1000downlink: 1.35ect: 3gsec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.2045.47"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: POST /undersideproactive/api/v1/trigger HTTP/1.1Host: services.bingapis.comConnection: keep-aliveContent-Length: 225X-UDSD-Features: udscomseaodp,Content-Type: application/jsonSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: POST /undersideproactive/api/v1/trigger HTTP/1.1Host: services.bingapis.comConnection: keep-aliveContent-Length: 198Content-Type: application/jsonSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /statics/icons/favicon_newtabpage.png HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/entry.DpFa3lRQ.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/common-css.DDlbUlil.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/common-js.BTOm0pKS.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /service/msn/user?apikey=1hYoJsIRvPEnSkk0hlnJF2092mHqiz7xFenIFKa9uc&activityId=9628264C-936C-41D0-9FF8-A92CF907C381&ocid=pdp-peregrine&cm=en-us&it=app&user=m-09D127A13BAC64A13625320C3A8C6504&scn=APP_ANON&source=market-consolidation HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: OPTIONS /service/news/feed/pages/weblayout?User=m-09D127A13BAC64A13625320C3A8C6504&activityId=9628264C-936C-41D0-9FF8-A92CF907C381&adminDisabled=false&adoffsets=c1:-1,c2:-1,c3:-1&adsTimeout=600&anaheimPageLayout=inspirational&apikey=0QfOX3Vn51YCzitbLaRkTTBadtWpgTN8NZLW0C1SEM&apptype=edgeChromium&audienceMode=adult&backgroundImageIsSet=false&cm=en-us&colstatus=c1:0,c2:0,c3:0&column=c3&colwidth=300&contentType=article,video,slideshow,webcontent&cookieWallPresent=false&duotone=true&inEdgeFeatures=false&it=app&l3v=2&layout=c3&memory=8&mobile=false&newsSkip=0&newsTop=48&ocid=anaheim-ntp-feeds&overlay=0&pgc=2083&pgname=default&pgtype=ntp&revertTimes=0&scn=APP_ANON&timeOut=1000&verticalName=edge&vpSize=1232x876&wposchema=byregion HTTP/1.1Host: assets.msn.comConnection: keep-aliveAccept: */*Access-Control-Request-Method: GETAccess-Control-Request-Headers: ads-referer,onesvc-uni-feat-tun,taboola-sessionidOrigin: https://ntp.msn.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Sec-Fetch-Mode: corsSec-Fetch-Site: same-siteSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common-feed-libs.2c59a8d2dc8646105a8c.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common-cscore.7146072dacb9c6d847f4.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/super-nav.299b385ac537a2be3f75.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/fluent.BiD5QW9j.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/edge-icon.BwIA8KUD.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/ControlFocusTarget.Ce7AmkHT.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: HEAD /statics/icons/favicon.ico HTTP/1.1Host: assets.msn.comConnection: keep-alivePragma: no-cacheCache-Control: no-cachesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /service/news/feed/pages/weblayout?User=m-09D127A13BAC64A13625320C3A8C6504&activityId=9628264C-936C-41D0-9FF8-A92CF907C381&adminDisabled=false&adoffsets=c1:-1,c2:-1,c3:-1&adsTimeout=600&anaheimPageLayout=inspirational&apikey=0QfOX3Vn51YCzitbLaRkTTBadtWpgTN8NZLW0C1SEM&apptype=edgeChromium&audienceMode=adult&backgroundImageIsSet=false&cm=en-us&colstatus=c1:0,c2:0,c3:0&column=c3&colwidth=300&contentType=article,video,slideshow,webcontent&cookieWallPresent=false&duotone=true&inEdgeFeatures=false&it=app&l3v=2&layout=c3&memory=8&mobile=false&newsSkip=0&newsTop=48&ocid=anaheim-ntp-feeds&overlay=0&pgc=2083&pgname=default&pgtype=ntp&revertTimes=0&scn=APP_ANON&timeOut=1000&verticalName=edge&vpSize=1232x876&wposchema=byregion HTTP/1.1Host: assets.msn.comConnection: keep-aliveads-referer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bingsec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"OneSvc-Uni-Feat-Tun: EdgeInterestTier1Ids:null;LoginState:NA;Product:anaheim;PageName:default;PageType:ntp;OCID:msedgntp;ViewPortWidth:1280;ViewPortHeight:984;sec-ch-ua-mobile: ?0taboola-sessionId: initUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/MediaItemSearchBox.BFsE-D11.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/ClvmMv5j.js HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /resolver/api/resolve/v3/config/?expType=AppConfig&expInstance=default&apptype=edgeChromium&v=20250311.398&targetScope={%22audienceMode%22:%22adult%22,%22browser%22:{%22browserType%22:%22edgeChromium%22,%22version%22:%22117%22,%22ismobile%22:%22false%22},%22deviceFormFactor%22:%22desktop%22,%22domain%22:%22ntp.msn.com%22,%22locale%22:{%22content%22:{%22language%22:%22en%22,%22market%22:%22us%22},%22display%22:{%22language%22:%22en%22,%22market%22:%22us%22}},%22os%22:%22windows%22,%22platform%22:%22web%22,%22pageType%22:%22ntp%22,%22pageExperiments%22:[%22prg-ad-ivq%22,%22prg-ad-price-trun%22,%22prg-additional-tile%22,%22prg-c-adspfpv%22,%22prg-errtoast2%22,%22prg-neutral-bg%22,%22prg-pr2-dis-signal%22]} HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 910sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.35sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 1000sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&prerender=1Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=c098878e-100a-48f4-a574-35b1df1f7ac1; _C_ETH=1; msnup=%7B%22cnex%22%3A%22no%22%7D; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/waterfall-view-feed.eb3bb2e7a9bb47e23bf8.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common-others.187dd34bde541e6b8bdd.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 52.113.196.254
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.44.203.86
Source: global trafficHTTP traffic detected: GET /crx/blobs/Ad_brx23lef_cW590ESOTTAroOhZ9si0XFJIUC52j2ILHW1VLB5ou6c0RgLWwGr1aRJJZ0WPNyiPBYgIpWfykvhKW-6BLzMRsp9ykw5f6ReBQmPpO6WB9pcSJPfykLTHDjYAxlKa5bf72z8tHS5eXuTavTP1h4WZBjSs/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_89_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7&response_type=id_token+code&nonce=d22a6b2b-7222-49dc-911b-88978835749d&redirect_uri=https%3a%2f%2fwww.bing.com%2forgid%2fidtoken%2fconditional&scope=openid%20email%20profile%209ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7/.default&response_mode=form_post&instance_aware=true&msafed=0&prompt=none&state=%7b%22ig%22%3a%2232ECE75CD7B940B89469DB7630896798%22%7d HTTP/1.1Host: login.microsoftonline.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: iframeReferer: https://www.bing.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/SSR-extension.1e1de479ffc2b85d14c8.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.35sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 800sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=BingAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/web-worker.948ffa5ea2d441a35f55.js HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 876sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.35sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 800sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: same-originSec-Fetch-Dest: workerReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=BingAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/microsoft.c1f2f2c818c03b7d76c6.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/vendors.cb5d86730a0bdbdd55a4.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common.41f9102ebf55f037c91d.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/experience.6956f4a50d95807c6fa7.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /resolver/api/resolve/v3/config/?expType=AppConfig&expInstance=default&apptype=edgeChromium&v=20250311.398&targetScope={%22audienceMode%22:%22adult%22,%22browser%22:{%22browserType%22:%22edgeChromium%22,%22version%22:%22117%22,%22ismobile%22:%22false%22},%22deviceFormFactor%22:%22desktop%22,%22domain%22:%22ntp.msn.com%22,%22locale%22:{%22content%22:{%22language%22:%22en%22,%22market%22:%22us%22},%22display%22:{%22language%22:%22en%22,%22market%22:%22us%22}},%22os%22:%22windows%22,%22platform%22:%22web%22,%22pageType%22:%22ntp%22,%22pageExperiments%22:[%22prg-ad-ivq%22,%22prg-ad-price-trun%22,%22prg-additional-tile%22,%22prg-c-adspfpv%22,%22prg-errtoast2%22,%22prg-neutral-bg%22,%22prg-pr2-dis-signal%22]} HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&prerender=1 HTTP/1.1Host: ntp.msn.comConnection: keep-alivedevice-memory: 8sec-ch-dpr: 1sec-ch-viewport-width: 1232sec-ch-viewport-height: 910rtt: 1000downlink: 1.35ect: 3gsec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.2045.47"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-prefers-color-scheme: lightUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_Auth=; _C_ETH=1; sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /statics/icons/favicon_newtabpage.png HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: _C_ETH=1; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/entry.DpFa3lRQ.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/common-css.DDlbUlil.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/common-js.BTOm0pKS.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /service/msn/user?apikey=1hYoJsIRvPEnSkk0hlnJF2092mHqiz7xFenIFKa9uc&activityId=9628264C-936C-41D0-9FF8-A92CF907C381&ocid=pdp-peregrine&cm=en-us&it=app&user=m-09D127A13BAC64A13625320C3A8C6504&scn=APP_ANON&source=market-consolidation HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common-feed-libs.2c59a8d2dc8646105a8c.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common-cscore.7146072dacb9c6d847f4.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/super-nav.299b385ac537a2be3f75.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/fluent.BiD5QW9j.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/edge-icon.BwIA8KUD.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/ControlFocusTarget.Ce7AmkHT.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /service/news/feed/pages/weblayout?User=m-09D127A13BAC64A13625320C3A8C6504&activityId=9628264C-936C-41D0-9FF8-A92CF907C381&adminDisabled=false&adoffsets=c1:-1,c2:-1,c3:-1&adsTimeout=600&anaheimPageLayout=inspirational&apikey=0QfOX3Vn51YCzitbLaRkTTBadtWpgTN8NZLW0C1SEM&apptype=edgeChromium&audienceMode=adult&backgroundImageIsSet=false&cm=en-us&colstatus=c1:0,c2:0,c3:0&column=c3&colwidth=300&contentType=article,video,slideshow,webcontent&cookieWallPresent=false&duotone=true&inEdgeFeatures=false&it=app&l3v=2&layout=c3&memory=8&mobile=false&newsSkip=0&newsTop=48&ocid=anaheim-ntp-feeds&overlay=0&pgc=2083&pgname=default&pgtype=ntp&revertTimes=0&scn=APP_ANON&timeOut=1000&verticalName=edge&vpSize=1232x876&wposchema=byregion HTTP/1.1Host: assets.msn.comConnection: keep-aliveads-referer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bingsec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"OneSvc-Uni-Feat-Tun: EdgeInterestTier1Ids:null;LoginState:NA;Product:anaheim;PageName:default;PageType:ntp;OCID:msedgntp;ViewPortWidth:1280;ViewPortHeight:984;sec-ch-ua-mobile: ?0taboola-sessionId: initUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Origin: https://ntp.msn.comSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/MediaItemSearchBox.BFsE-D11.css HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /shared/edgeweb/_nuxt/ClvmMv5j.js HTTP/1.1Host: edgecdn-embza6g8cacagcbn.z01.azurefd.netConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://www.microsoft.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://www.microsoft.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /resolver/api/resolve/v3/config/?expType=AppConfig&expInstance=default&apptype=edgeChromium&v=20250311.398&targetScope={%22audienceMode%22:%22adult%22,%22browser%22:{%22browserType%22:%22edgeChromium%22,%22version%22:%22117%22,%22ismobile%22:%22false%22},%22deviceFormFactor%22:%22desktop%22,%22domain%22:%22ntp.msn.com%22,%22locale%22:{%22content%22:{%22language%22:%22en%22,%22market%22:%22us%22},%22display%22:{%22language%22:%22en%22,%22market%22:%22us%22}},%22os%22:%22windows%22,%22platform%22:%22web%22,%22pageType%22:%22ntp%22,%22pageExperiments%22:[%22prg-ad-ivq%22,%22prg-ad-price-trun%22,%22prg-additional-tile%22,%22prg-c-adspfpv%22,%22prg-errtoast2%22,%22prg-neutral-bg%22,%22prg-pr2-dis-signal%22]} HTTP/1.1Host: ntp.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-viewport-height: 910sec-ch-ua-arch: "x86"sec-ch-viewport-width: 1232sec-ch-ua-platform-version: "10.0.0"downlink: 1.35sec-ch-ua-bitness: "64"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-model: ""sec-ch-prefers-color-scheme: lightsec-ch-ua-platform: "Windows"device-memory: 8rtt: 1000sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-full-version: "117.0.2045.47"sec-ch-dpr: 1ect: 3gAccept: */*sec-edge-ntp: {"back_block":0,"bg_cur":{},"bg_img_typ":"bing","exp":["msQuickLinksDefaultOneRow","msShoppingWebAssistOnNtp","msShoppingHistogramsOnNtp","msEnableWinHPNewTabBackButtonFocusAndClose","msCustomMaxQuickLinks","msMaxQuickLinksAt20","msAllowThemeInstallationFromChromeStore","msEdgeSplitWindowLinkMode"],"feed":0,"feed_dis":"onscroll","layout":1,"quick_links_opt":1,"sel_feed_piv":"","show_greet":true,"vt_opened":false}Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing&prerender=1Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8Cookie: sptmarket=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z; USRLOC=; MUID=09D127A13BAC64A13625320C3A8C6504; MUIDB=09D127A13BAC64A13625320C3A8C6504; _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; _EDGE_V=1; MicrosoftApplicationsTelemetryDeviceId=c098878e-100a-48f4-a574-35b1df1f7ac1; _C_ETH=1; msnup=%7B%22cnex%22%3A%22no%22%7D; sptmarket_restored=en-GB||us|en-us|en-us|en||cf=9|RefA=9628264C936C41D09FF8A92CF907C381.RefC=2025-03-12T16:13:30Z
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/waterfall-view-feed.eb3bb2e7a9bb47e23bf8.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /bundles/v1/edgeChromium/latest/common-others.187dd34bde541e6b8bdd.js HTTP/1.1Host: assets.msn.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://ntp.msn.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: scriptReferer: https://ntp.msn.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: "url": "https://www.youtube.com" equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: Click to play.\" data-dc=\"vtdc_black\" class=\"mc_vtvc_link\" target=\"_blank\" href=\"https://www.bing.com/ck/a?!&amp;&amp;p=0a95aeab97d94f11a17f386c656553d5a3c2124e8bfe2970b880983efd480a1dJmltdHM9MTc0MTczNzYwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c73c2ec-6b5c-6c63-3b60-d7416a2f6d27&amp;u=a1L3ZpZGVvcy9yaXZlcnZpZXcvcmVsYXRlZHZpZGVvP3E9aG93K3RvK2dldCtoZWxwK2luK3dpbmRvd3MmJm1pZD04RjJBRkJDMkM2NDUzQUM3MjdFMzhGMkFGQkMyQzY0NTNBQzcyN0UzJm1tc2NuPXN0dm8mbWNpZD0zMkVDRTc1Q0Q3Qjk0MEI4OTQ2OURCNzYzMDg5Njc5OCZGT1JNPVZJUkU&amp;ntb=1\" h=\"ID=SERP,5650.1\"><div class=\"mc_vtvc_con_rc\" ourl=\"https://www.youtube.com/watch?v=q8w4-4vjty4\" vscm=\"{&quot;mid&quot;:&quot;8F2AFBC2C6453AC727E38F2AFBC2C6453AC727E3&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=q8w4-4vjty4&quot;,&quot;pgurl&quot;:&quot;https://www.youtube.com/watch?v=q8w4-4vjty4&quot;,&quot;turl&quot;:&quot;https://ts1.mm.bing.net/th?id=OVP.aNA2VK6Ap6gspeWQAy6k_wEkII&amp;pid=15.1&amp;W=89&amp;H=160&quot;,&quot;IsSaveable&quot;:true}\"><div class=\"mc_vtvc_th b_canvas\"><div class=\"cico\"><img height=\"204\" width=\"115\" data-src-hq=\"//th.bing.com/th?id=OVP.aNA2VK6Ap6gspeWQAy6k_wEkII&amp;w=115&amp;h=204&amp;c=7&amp;rs=1&amp;qlt=90&amp;o=6&amp;pid=1.7\" alt=\"How to get help in Windows | #computer #asmr #tricks #keyboard #typing\" data-priority=\"2\" id=\"emb86B0AB7A9\" class=\"rms_img\" src=\"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAEALAAAAAABAAEAAAIBTAA7\"></div><div class=\"grad_b\"></div><div class=\"mc_vtvc_htc\"><div class=\"mc_vtvc_htb\"><div class=\"mc_vtvc_ht\">Watch video</div></div></div><div class=\"mc_vtvc_center_play\"></div><div class=\"mc_vtvc_ban_lo\"><div class=\"vtbc\"><div class=\"mc_bc_w b_smText\"><div class=\"mc_bc items\">00:08</div></div></div></div></div><div class=\"mc_vtvc_th_dock vtdc_black\"></div><div class=\"mc_vtvc_meta\"><span class=\"vcmt_ctt vasyt\">YouTube</span><div class=\"mc_vtvc_meta_row_channel\">@Key sistam</div><div class=\"mc_vtvc_title b_promtxt\" title=\"How to get help in Windows | #computer #asmr #tricks #keyboard #typing\"><strong>How to get help in Windows | #computer #asmr #tricks #keyboard #typing</strong></div></div><div class=\"vrhdata\" sab=\"1\" mid=\"8F2AFBC2C6453AC727E38F2AFBC2C6453AC727E3\" hcid=\"vsb_tr_chd_hc\" vrhm=\"\"></div></div></a></div></div><div class=\"slide\" data-dataurl=\"\" data-rinterval=\"\" data-appns=\"SERP\" data-k=\"5660.1\" data-tag=\"\" style=\"\" tabindex=\"\" data-mini=\"\" role=\"listitem\"><div id=\"mc_vtvc_SERP_30\" class=\"mc_vtvc b_canvas mc_vtvc_cc mc_vtvc_tot\"><a aria-label=\"how to get help = equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: Click to play.\" data-dc=\"vtdc_black\" class=\"mc_vtvc_link\" target=\"_blank\" href=\"https://www.bing.com/ck/a?!&amp;&amp;p=65374aa0bd7c021c35691449d597d6653e7962ea8b633773eeb13c80f22cc9e1JmltdHM9MTc0MTczNzYwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c73c2ec-6b5c-6c63-3b60-d7416a2f6d27&amp;u=a1L3ZpZGVvcy9yaXZlcnZpZXcvcmVsYXRlZHZpZGVvP3E9aG93K3RvK2dldCtoZWxwK2luK3dpbmRvd3MmJm1pZD0wNEMzRThENzczMjYwNkM2RURFMzA0QzNFOEQ3NzMyNjA2QzZFREUzJm1tc2NuPXN0dm8mbWNpZD0zMkVDRTc1Q0Q3Qjk0MEI4OTQ2OURCNzYzMDg5Njc5OCZGT1JNPVZJUkU&amp;ntb=1\" h=\"ID=SERP,5648.1\"><div class=\"mc_vtvc_con_rc\" ourl=\"https://www.youtube.com/watch?v=DdDjUfhAvI8\" vscm=\"{&quot;mid&quot;:&quot;04C3E8D7732606C6EDE304C3E8D7732606C6EDE3&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=DdDjUfhAvI8&quot;,&quot;pgurl&quot;:&quot;https://www.youtube.com/watch?v=DdDjUfhAvI8&quot;,&quot;turl&quot;:&quot;https://ts4.mm.bing.net/th?id=OVP.APX4-GpTytL8I5X8eqiQPwEkII&amp;pid=15.1&amp;W=89&amp;H=160&quot;,&quot;IsSaveable&quot;:true}\"><div class=\"mc_vtvc_th b_canvas\"><div class=\"cico\"><img height=\"204\" width=\"115\" data-src-hq=\"//th.bing.com/th?id=OVP.APX4-GpTytL8I5X8eqiQPwEkII&amp;w=115&amp;h=204&amp;c=7&amp;rs=1&amp;qlt=90&amp;o=6&amp;pid=1.7\" alt=\"= equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: Click to play.\" data-dc=\"vtdc_black\" class=\"mc_vtvc_link\" target=\"_blank\" href=\"https://www.bing.com/ck/a?!&amp;&amp;p=8ab1048b2ab5ea36fa801d5b6fb1d540d0f0642dc569dda766ad4799c59ee799JmltdHM9MTc0MTczNzYwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c73c2ec-6b5c-6c63-3b60-d7416a2f6d27&amp;u=a1L3ZpZGVvcy9yaXZlcnZpZXcvcmVsYXRlZHZpZGVvP3E9aG93K3RvK2dldCtoZWxwK2luK3dpbmRvd3MmbWlkPUYwOUVDRTJCMzlGNTAwMzE1RjQ1RjA5RUNFMkIzOUY1MDAzMTVGNDUmbWNpZD0zMkVDRTc1Q0Q3Qjk0MEI4OTQ2OURCNzYzMDg5Njc5OCZGT1JNPVZJUkU&amp;ntb=1\" h=\"ID=SERP,5568.1\"><div class=\"mc_vtvc_con_rc\"><div class=\"mc_vtvc_th b_canvas\"><div class=\"cico\"><img height=\"110\" width=\"197\" data-src-hq=\"//th.bing.com/th?id=OVP.haFEKOTL9PYBjGBlT_BmOwHgFo&amp;w=197&amp;h=110&amp;c=7&amp;rs=1&amp;qlt=90&amp;o=6&amp;pid=1.7\" alt=\"How to Get Help in Windows 11 23H2 (All Ways)\" data-priority=\"2\" id=\"emb478B220CA\" class=\"rms_img\" src=\"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAEALAAAAAABAAEAAAIBTAA7\"></div><div class=\"mc_vtvc_htc\"><div class=\"mc_vtvc_htb\"><div class=\"mc_vtvc_ht\">Watch video</div></div></div><div class=\"mc_vtvc_center_play\"></div><div class=\"mc_vtvc_ban_lo\"><div class=\"vtbc\"><div class=\"mc_bc_w b_smText\"><div class=\"mc_bc items\">3:39</div></div></div></div></div><div class=\"mc_vtvc_meta\"><div class=\"mc_vtvc_title\" title=\"How to Get Help in Windows 11 23H2 (All Ways)\"><strong>How</strong> <strong>to</strong> <strong>Get</strong> <strong>Help</strong> <strong>in</strong> <strong>Windows</strong> 11 23H2 (All Ways)</div><div class=\"mc_vtvc_meta_block_area\"><div class=\"mc_vtvc_meta_row mc_vtvc_meta_pubdate\"><span class=\"meta_vc_content\">565 views</span><span class=\"meta_pd_content\">18 Nov 2023</span></div><div class=\"mc_vtvc_meta_row mc_vtvc_meta_channel\"><span>YouTube</span><span class=\"mc_vtvc_meta_row_channel\">Geeker Mag.</span></div></div></div><div class=\"vrhdata\" ht=\"0\" vrhm=\"{&quot;cid&quot;:&quot;serpvidans_hc&quot;,&quot;smturl&quot;:&quot;/th?id=OM.RV8xAPU5K86e8A_1736003267&amp;pid=1.7&quot;,&quot;bci&quot;:0,&quot;du&quot;:&quot;3:39&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=1ZtBOD3LPT0&quot;,&quot;thid&quot;:&quot;OVP.haFEKOTL9PYBjGBlT_BmOwHgFo&quot;,&quot;mid&quot;:&quot;F09ECE2B39F500315F45F09ECE2B39F500315F45&quot;,&quot;vt&quot;:&quot;How to Get Help in Windows 11 23H2 (All Ways)&quot;,&quot;IsAdultThumb&quot;:false,&quot;EnableLoopPlay&quot;:false,&quot;pgurl&quot;:&quot;https://www.youtube.com/watch?v=1ZtBOD3LPT0&quot;,&quot;q&quot;:&quot;how to get help in windows&quot;}\"></div></div></a></div></div><div id=\"mc_cwvc_1741795958715\"><div id=\"mc_vtvc__19\" class=\"mc_vtvc b_canvas mc_vtvc_cc creator\" data-priority=\"1\"><a aria-label=\" equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: Click to play.\" data-dc=\"vtdc_black\" class=\"mc_vtvc_link\" target=\"_blank\" href=\"https://www.bing.com/ck/a?!&amp;&amp;p=b3ecdfa50e9041491277c5508e032f43f2a818d19c0c737aa78d08ddcdd9ece1JmltdHM9MTc0MTczNzYwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c73c2ec-6b5c-6c63-3b60-d7416a2f6d27&amp;u=a1L3ZpZGVvcy9yaXZlcnZpZXcvcmVsYXRlZHZpZGVvP3E9aG93K3RvK2dldCtoZWxwK2luK3dpbmRvd3MmJm1pZD00MkQ1OEVGNEQ4MkI2QTI3Njc5QTQyRDU4RUY0RDgyQjZBMjc2NzlBJm1tc2NuPXN0dm8mbWNpZD0zMkVDRTc1Q0Q3Qjk0MEI4OTQ2OURCNzYzMDg5Njc5OCZGT1JNPVZJUkU&amp;ntb=1\" h=\"ID=SERP,5652.1\"><div class=\"mc_vtvc_con_rc\" ourl=\"https://www.youtube.com/watch?v=ifj6gpW5agw\" vscm=\"{&qh equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: Click to play.\" data-dc=\"vtdc_white\" class=\"mc_vtvc_link\" target=\"_blank\" href=\"https://www.bing.com/ck/a?!&amp;&amp;p=1bc304e569cc152e68807a3463ccb33db6af93084564c9805b704aa05340ed1dJmltdHM9MTc0MTczNzYwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c73c2ec-6b5c-6c63-3b60-d7416a2f6d27&amp;u=a1L3ZpZGVvcy9yaXZlcnZpZXcvcmVsYXRlZHZpZGVvP3E9aG93K3RvK2dldCtoZWxwK2luK3dpbmRvd3MmJm1pZD01RDM5MDU1QzNEMjYzN0U5QzNGNzVEMzkwNTVDM0QyNjM3RTlDM0Y3Jm1tc2NuPXN0dm8mbWNpZD0zMkVDRTc1Q0Q3Qjk0MEI4OTQ2OURCNzYzMDg5Njc5OCZGT1JNPVZJUkU&amp;ntb=1\" h=\"ID=SERP,5646.1\"><div class=\"mc_vtvc_con_rc\" ourl=\"https://www.youtube.com/watch?v=bOJD1tjg57I\" vscm=\"{&quot;mid&quot;:&quot;5D39055C3D2637E9C3F75D39055C3D2637E9C3F7&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=bOJD1tjg57I&quot;,&quot;pgurl&quot;:&quot;https://www.youtube.com/watch?v=bOJD1tjg57I&quot;,&quot;turl&quot;:&quot;https://ts1.mm.bing.net/th?id=OVP.kuScSbWAWWTLY08NoTxdKwHdII&amp;pid=15.1&amp;W=146&amp;H=160&quot;,&quot;IsSaveable&quot;:true}\"><div class=\"mc_vtvc_th b_canvas\"><div class=\"cico\"><img height=\"204\" width=\"115\" data-src-hq=\"//th.bing.com/th?id=OVP.kuScSbWAWWTLY08NoTxdKwHdII&amp;w=115&amp;h=204&amp;c=7&amp;rs=1&amp;qlt=90&amp;o=6&amp;pid=1.7\" alt=\"How to Get Help in Windows 10\" data-priority=\"2\" id=\"emb635054E8F\" class=\"rms_img\" src=\"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAEALAAAAAABAAEAAAIBTAA7\"></div><div class=\"grad_b\"></div><div class=\"mc_vtvc_htc\"><div class=\"mc_vtvc_htb\"><div class=\"mc_vtvc_ht\">Watch video</div></div></div><div class=\"mc_vtvc_center_play\"></div><div class=\"mc_vtvc_ban_lo\"><div class=\"vtbc\"><div class=\"mc_bc_w b_smText\"><div class=\"mc_bc items\">00:41</div></div></div></div></div><div class=\"mc_vtvc_th_dock vtdc_white\"></div><div class=\"mc_vtvc_meta\"><span class=\"vcmt_ctt vasyt\">YouTube</span><div class=\"mc_vtvc_meta_row_channel\">@<span title=\"OS Attack - Attack of the Operating Systems\">OS Attack - Attack</span></div><div class=\"mc_vtvc_title b_promtxt\" title=\"How to Get Help in Windows 10\"><strong>How to Get Help in Windows 10</strong></div></div><div class=\"vrhdata\" sab=\"1\" mid=\"5D39055C3D2637E9C3F75D39055C3D2637E9C3F7\" hcid=\"vsb_tr_chd_hc\" vrhm=\"\"></div></div></a></div></div><div class=\"slide\" data-dataurl=\"\" data-rinterval=\"\" data-appns=\"SERP\" data-k=\"5658.1\" data-tag=\"\" style=\"\" tabindex=\"\" data-mini=\"\" role=\"listitem\"><div id=\"mc_vtvc_SERP_26\" class=\"mc_vtvc b_canvas mc_vtvc_cc mc_vtvc_tot\"><a aria-label=\"= equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: Click to play.\" data-dc=\"vtdc_white\" class=\"mc_vtvc_link\" target=\"_blank\" href=\"https://www.bing.com/ck/a?!&amp;&amp;p=c069ea0bca5e87203f3e5e0ec671d3489329b6af1195275f42ca08848eaf5688JmltdHM9MTc0MTczNzYwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0c73c2ec-6b5c-6c63-3b60-d7416a2f6d27&amp;u=a1L3ZpZGVvcy9yaXZlcnZpZXcvcmVsYXRlZHZpZGVvP3E9aG93K3RvK2dldCtoZWxwK2luK3dpbmRvd3MmbWlkPUJBNkY5RDhCMDM0RjlFRjc5Rjg4QkE2RjlEOEIwMzRGOUVGNzlGODgmbWNpZD0zMkVDRTc1Q0Q3Qjk0MEI4OTQ2OURCNzYzMDg5Njc5OCZGT1JNPVZJUkU&amp;ntb=1\" h=\"ID=SERP,5555.1\"><div class=\"mc_vtvc_con_rc\"><div class=\"mc_vtvc_th b_canvas\"><div class=\"cico\"><img height=\"225\" width=\"400\" data-src-hq=\"//th.bing.com/th?id=OVP.3bQCUcvgHvEGC8FscnPuPAHgFo&amp;w=400&amp;h=225&amp;c=7&amp;rs=1&amp;qlt=90&amp;o=6&amp;pid=1.7\" alt=\"Windows 10 | How to use Quick Assist\" data-priority=\"2\" id=\"emb2171958D3\" class=\"rms_img\" src=\"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAEALAAAAAABAAEAAAIBTAA7\"></div><div class=\"mc_vtvc_htc\"><div class=\"mc_vtvc_htb\"><div class=\"mc_vtvc_ht\">Watch video</div></div></div><div class=\"mc_vtvc_center_play\"></div><div class=\"mc_vtvc_ban_lo\"><div class=\"vtbc\"><div class=\"mc_bc_w b_smText\"><div class=\"mc_bc items\">4:08</div></div></div></div></div><div class=\"mc_vtvc_meta_w\"><div class=\"mc_vtvc_meta_bg_w\"></div><div class=\"mc_vtvc_meta\"><div class=\"mc_vtvc_title b_promtxt\" title=\"Windows 10 | How to use Quick Assist\"><strong>Windows</strong> 10 | <strong>How</strong> <strong>to</strong> use Quick Assist</div><div class=\"mc_vtvc_meta_block_area\"><div class=\"mc_vtvc_meta_block\"><div class=\"mc_vtvc_meta_row mc_vtvc_meta_pubdate\"><span class=\"meta_vc_content\">60.5K views</span><span class=\"meta_pd_content\">31 Mar 2020</span></div><div class=\"mc_vtvc_meta_row mc_vtvc_meta_channel\"><img class=\"mmsi rms_img\" alt=\"Video source site\" src=\"data:image/png;base64,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\"><span>YouTube</span><span class=\"mc_vtvc_meta_row_channel\">Windows</span></div></div></div></div></div><div class=\"vrhdata\" ht=\"0\" vrhm=\"{&quot;cid&quot;:&quot;mc_cwvc_hc&quot;,&quot;smturl&quot;:&quot;/th?id=OM.iJ_3nk8Di51vug_1735918341&amp;pid=1.7&quot;,&quot;bci&quot;:0,&quot;du&quot;:&quot;4:08&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=X5cT4tjp5GI&quot;,&quot;thid&quot;:&quot;OVP.3bQCUcvgHvEGC8FscnPuPAHgFo&quot;,&quot;mid&quot;:&quot;BA6F9D8B034F9EF79F88BA6F9D8B034F9EF79F88&quot;,&quot;vt&quot;:&quot;Windows 10 | How to use Qu
Source: 000003.log0.14.drString found in binary or memory: eta_channel\"><span>YouTube</span><span class=\"mc_vtvc_meta_row_channel\">TechX Tutorials</span></div></div></div><div class=\"vrhdata\" ht=\"0\" vrhm=\"{&quot;cid&quot;:&quot;serpvidans_hc&quot;,&quot;smturl&quot;:&quot;/th?id=OM.AendKaqGLqZpZQ_1739525101&amp;pid=1.7&quot;,&quot;bci&quot;:0,&quot;du&quot;:&quot;4:03&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=Gx9sPUXs1zI&quot;,&quot;thid&quot;:&quot;OVP.NmtyQ-jAfIwjk3gkRXkPKQHgFo&quot;,&quot;mid&quot;:&quot;6569A62E86AA29DDE9016569A62E86AA29DDE901&quot;,&quot;vt&quot;:&quot;How To Get Help In Windows 10&quot;,&quot;IsAdultThumb&quot;:false,&quot;EnableLoopPlay&quot;:false,&quot;pgurl&quot;:&quot;https://www.youtube.com/watch?v=Gx9sPUXs1zI&quot;,&quot;q&quot;:&quot;how to get help in windows&quot;}\"></div></div></a></div></div><div id=\"mc_cwvc_1741795958718\"><div id=\"mc_vtvc__22\" class=\"mc_vtvc b_canvas mc_vtvc_cc creator\" data-priority=\"2\"><a aria-label=\" equals www.youtube.com (Youtube)
Source: 000003.log0.14.drString found in binary or memory: uot;mid&quot;:&quot;42D58EF4D82B6A27679A42D58EF4D82B6A27679A&quot;,&quot;murl&quot;:&quot;https://www.youtube.com/watch?v=ifj6gpW5agw&quot;,&quot;pgurl&quot;:&quot;https://www.youtube.com/watch?v=ifj6gpW5agw&quot;,&quot;turl&quot;:&quot;https://ts1.mm.bing.net/th?id=OVP.ZyxBFwll1ny463qrrKuN6AEkII&amp;pid=15.1&amp;W=89&amp;H=160&quot;,&quot;IsSaveable&quot;:true}\"><div class=\"mc_vtvc_th b_canvas\"><div class=\"cico\"><img height=\"204\" width=\"115\" data-src-hq=\"//th.bing.com/th?id=OVP.ZyxBFwll1ny463qrrKuN6AEkII&amp;w=115&amp;h=204&amp;c=7&amp;rs=1&amp;qlt=90&amp;o=6&amp;pid=1.7\" alt=\"how to get help = equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: bzib.nelreports.net
Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
Source: global trafficDNS traffic detected: DNS query: clients2.googleusercontent.com
Source: global trafficDNS traffic detected: DNS query: sb.scorecardresearch.com
Source: global trafficDNS traffic detected: DNS query: edgecdn-embza6g8cacagcbn.z01.azurefd.net
Source: unknownDoH DNS queries detected: name: bzib.nelreports.net
Source: unknownHTTP traffic detected: POST /dns-query HTTP/1.1Host: chrome.cloudflare-dns.comConnection: keep-aliveContent-Length: 128Accept: application/dns-messageAccept-Language: *User-Agent: ChromeAccept-Encoding: identityContent-Type: application/dns-message
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-Cache: CONFIG_NOCACHEAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionX-MSEdge-Ref: Ref A: 954B4327D790493BBB47627436B314A4 Ref B: BOS321000101023 Ref C: 2025-03-12T16:13:41ZDate: Wed, 12 Mar 2025 16:13:41 GMTConnection: closeContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-Cache: CONFIG_NOCACHEAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionX-MSEdge-Ref: Ref A: 91D6147E0C2347E88AE5DA5309AB442B Ref B: BOS321000107025 Ref C: 2025-03-12T16:14:33ZDate: Wed, 12 Mar 2025 16:14:33 GMTConnection: closeContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-Cache: CONFIG_NOCACHEAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionX-MSEdge-Ref: Ref A: 4F9BD5A2C44B44BA9F72BE9E2B368AE9 Ref B: BOS321000108053 Ref C: 2025-03-12T16:14:33ZDate: Wed, 12 Mar 2025 16:14:33 GMTConnection: closeContent-Length: 0
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: application/json; charset=utf-8Access-Control-Allow-Headers: TicketType,RequestContinuationKey,AuthToken,Content-Type,x-client-activityid,ms-cv,OneSvc-Uni-Feat-Tun,signedInCookieName,muid,appid,User-Location,user-location,userauthtoken,usertickettype,sitename,s2sauthtoken,thumbprint,Authorization,Ent-Authorization,UserIdToken,DDD-TMPL,DDD-ActivityId,DDD-FeatureSet,DDD-Session-ID,Date,date,ads-referer,ads-referer,taboola-sessionId,taboola-sessionid,Akamai-Request-ID,Akamai-Server-IP,X-MSEdge-Ref,DDD-DebugId,s-xbox-token,OneWebServiceLatency,X-FD-Features,DDD-UserType,traceparent,Widgets,Muted,Velocity,DDD-Auth-Features,SoftLanding,PrefMigrated,DDD-TMPL-Removed,deviceFeatures,Server-Timing,DDD-LocationAssignedAccess-Control-Expose-Headers: TicketType,RequestContinuationKey,AuthToken,Content-Type,x-client-activityid,ms-cv,OneSvc-Uni-Feat-Tun,signedInCookieName,muid,appid,User-Location,user-location,userauthtoken,usertickettype,sitename,s2sauthtoken,thumbprint,Authorization,Ent-Authorization,UserIdToken,DDD-TMPL,DDD-ActivityId,DDD-FeatureSet,DDD-Session-ID,Date,date,ads-referer,ads-referer,taboola-sessionId,taboola-sessionid,Akamai-Request-ID,Akamai-Server-IP,X-MSEdge-Ref,DDD-DebugId,s-xbox-token,OneWebServiceLatency,X-FD-Features,DDD-UserType,traceparent,Widgets,Muted,Velocity,DDD-Auth-Features,SoftLanding,PrefMigrated,DDD-TMPL-Removed,deviceFeatures,Server-Timing,DDD-LocationAssignedDDD-AuthenticatedWithJwtFlow: FalseDDD-UserType: AnonymousMuidDDD-StrategyExecutionLatency: 00:00:00.0015941,00:00:00.0017460DDD-ActivityId: 59dc93b9-16bf-4efb-9987-c2876138904dDDD-TMPL-Removed: FalseDDD-DebugId: 59dc93b9-16bf-4efb-9987-c2876138904d|2025-03-12T16:14:36.1041821Z|fabric_msn|EUS2-A|News_344DDD-Auth-Features: AT:NA;DID:m-09D127A13BAC64A13625320C3A8C6504;IT:App;MuidStateOrigin:MuidFromCookieOneWebServiceLatency: 3X-MSEdge-ResponseInfo: 3Accept-CH: Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UAX-Ceto-ref: 67d1b2ec047346158a0929c0d6ab7eab|AFD:67d1b2ec047346158a0929c0d6ab7eab|2025-03-12T16:14:36.107ZX-MSEdge-Ref: Ref A: A1D697D2163B41BBA6BE06FE942F355D Ref B: EWR30EDGE0412 Ref C: 2025-03-12T16:14:36ZExpires: Wed, 12 Mar 2025 16:14:36 GMTDate: Wed, 12 Mar 2025 16:14:36 GMTContent-Length: 88Connection: closeSet-Cookie: _C_ETH=1; domain=.msn.com; path=/; secure; httponlySet-Cookie: _C_Auth=Set-Cookie: MUIDB=09D127A13BAC64A13625320C3A8C6504; expires=Mon, 06 Apr 2026 16:14:36 GMT; path=/; httponlySet-Cookie: _EDGE_S=F=1&SID=205C5B550D8168240BF14EF80C8069C7; domain=.msn.com; path=/; httponlyAlt-Svc: h3=":443"; ma=86400Akamai-Request-BC: [a=23.200.89.137,b=41942033,c=g,n=US_NJ_SECAUCUS,o=20940],[a=150.171.28.12,c=o]Server-Timing: clientrtt; dur=22, client
Source: license.rtf.0.drString found in binary or memory: http://schemas.microsoft.
Source: Reporting and NEL.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
Source: Reporting and NEL.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingcsp
Source: Reporting and NEL.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingserp
Source: Reporting and NEL.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingserp&ndcParam=QWthbWFp
Source: Reporting and NEL.14.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://bard.google.com/
Source: Reporting and NEL.14.drString found in binary or memory: https://bzib.nelreports.net/api/report?cat=bingbusiness
Source: 000003.log0.14.drString found in binary or memory: https://cdn.mos.cms.futurecdn.net/RjS4neeBaNTg5HjA8PuBmD-480-80.png&amp;q=how
Source: 000003.log0.14.drString found in binary or memory: https://cdn.mos.cms.futurecdn.net/ZfVMYXzUn3Yh4dVeWDjoRZ-480-80.png&amp;q=how
Source: 000003.log0.14.drString found in binary or memory: https://cdn.mos.cms.futurecdn.net/qiHVqDvYnXGQHGGFpSfag6-1200-80.jpg&amp;q=how
Source: offscreendocument_main.js.14.dr, service_worker_bin_prod.js.14.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/mathjax/
Source: Web Data.14.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: Web Data.14.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: Network Persistent State0.14.dr, a58d56ca-4f5a-4aa6-8845-a1d8642fedcc.tmp.16.drString found in binary or memory: https://chrome.cloudflare-dns.com
Source: manifest.json0.14.drString found in binary or memory: https://chrome.google.com/webstore/
Source: manifest.json0.14.drString found in binary or memory: https://chromewebstore.google.com/
Source: 983a89da-0dbb-4b4a-b436-a5a161984542.tmp.16.drString found in binary or memory: https://clients2.google.com
Source: manifest.json.14.drString found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 983a89da-0dbb-4b4a-b436-a5a161984542.tmp.16.drString found in binary or memory: https://clients2.googleusercontent.com
Source: Reporting and NEL.14.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
Source: manifest.json.14.drString found in binary or memory: https://docs.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-autopush.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-0.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-1.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-2.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-3.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-4.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-5.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-daily-6.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-preprod.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive-staging.corp.google.com/
Source: manifest.json.14.drString found in binary or memory: https://drive.google.com/
Source: Web Data.14.drString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: Web Data.14.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: Web Data.14.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: 000003.log5.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=Arbit
Source: 000003.log3.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtrac
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_163_music.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_M365_dark.png/1.7.32/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_M365_hc.png/1.7.32/asset
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_M365_light.png/1.7.32/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_action_center_hc.png/1.2.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_action_center_maximal_dark.png/1.2.1/ass
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_action_center_maximal_light.png/1.2.1/as
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_amazon_music_light.png/1.4.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_apple_music.png/1.4.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_bard_light.png/1.0.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_dark.png/1.1.17/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_dark.png/1.6.8/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_light.png/1.1.17/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_active_light.png/1.6.8/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_hc.png/1.1.17/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_chatB_hc.png/1.6.8/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_collections_hc.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_collections_maximal_dark.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_collections_maximal_light.png/1.0.3/asse
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_deezer.png/1.4.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_demo_dark.png/1.0.6/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_demo_light.png/1.0.6/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_designer_color.png/1.0.14/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_designer_hc.png/1.0.14/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_hc.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_maximal_dark.png/1.1.12/asset
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_edrop_maximal_light.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_etree_hc.png/1.2.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_etree_maximal_dark.png/1.2.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_etree_maximal_light.png/1.2.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_excel.png/1.7.32/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_facebook_messenger.png/1.5.14/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_gaana.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_hc.png/1.7.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_hc_controller.png/1.7.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_hc_joystick.png/1.7.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_dark.png/1.7.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_dark_controller.png/1.7.1/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_dark_joystick.png/1.7.1/as
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light.png/1.7.1/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light_controller.png/1.7.1
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_games_maximal_light_joystick.png/1.7.1/a
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_gmail.png/1.5.4/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_help.png/1.0.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_history_hc.png/0.1.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_history_maximal_dark.png/0.1.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_history_maximal_light.png/0.1.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_iHeart.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_image_creator_hc.png/1.0.14/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_image_creator_maximal_dark.png/1.0.14/as
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_image_creator_maximal_light.png/1.0.14/a
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_instagram.png/1.4.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_ku_gou.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_last.png/1.0.3/asset
Source: 000003.log5.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_manifest_gz/4.7.107/asset?assetgroup=Sho
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_maximal_follow_dark.png/1.1.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_maximal_follow_hc.png/1.1.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_maximal_follow_light.png/1.1.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_naver_vibe.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_onenote_dark.png/1.4.9/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_onenote_hc.png/1.4.9/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_onenote_light.png/1.4.9/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_outlook_dark.png/1.9.10/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_outlook_hc.png/1.9.10/asset
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_outlook_light.png/1.9.10/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_performance_hc.png/1.1.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_performance_maximal_dark.png/1.1.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_performance_maximal_light.png/1.1.0/asse
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_power_point.png/1.7.32/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_qq.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_refresh_dark.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_refresh_hc.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_refresh_light.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_rewards_hc.png/1.1.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_rewards_maximal_dark.png/1.1.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_rewards_maximal_light.png/1.1.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_search_hc.png/1.3.6/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_search_maximal_dark.png/1.3.6/asset
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_search_maximal_light.png/1.3.6/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_dark.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_dark.png/1.4.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_dark.png/1.5.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_hc.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_hc.png/1.4.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_hc.png/1.5.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_light.png/1.1.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_light.png/1.4.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_settings_light.png/1.5.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_hc.png/1.4.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_dark.png/1.4.0/asset
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_shopping_maximal_light.png/1.4.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_skype_dark.png/1.3.20/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_skype_hc.png/1.3.20/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_skype_light.png/1.3.20/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_sound_cloud.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_spotify.png/1.4.12/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_teams_dark.png/1.2.19/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_teams_hc.png/1.2.19/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_teams_light.png/1.2.19/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_telegram.png/1.0.4/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_theater_hc.png/1.0.5/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_theater_maximal_dark.png/1.0.5/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_theater_maximal_light.png/1.0.5/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_tidal.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_tik_tok_light.png/1.0.5/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_toolbox_hc.png/1.5.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_toolbox_maximal_dark.png/1.5.13/asset
Source: HubApps Icons.14.dr, ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_toolbox_maximal_light.png/1.5.13/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_twitter_light.png/1.0.9/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_vk.png/1.0.3/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_whats_new.png/1.0.0/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_whatsapp_light.png/1.4.11/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_word.png/1.7.32/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_yandex_music.png/1.0.10/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/edge_hub_apps_youtube.png/1.4.14/asset
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://excel.new?from=EdgeM365Shoreline
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://gaana.com/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://i.y.qq.com/n2/m/index.html
Source: Reporting and NEL.14.drString found in binary or memory: https://identity.nel.measure.office.net/api/report?catId=GW
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://latest.web.skype.com/?browsername=edge_canary_shoreline
Source: Session_13386269553009841.14.drString found in binary or memory: https://login.microsoftonline.com
Source: 000005.ldb.14.dr, 000003.log0.14.dr, Session_13386269553009841.14.drString found in binary or memory: https://login.microsoftonline.com/
Source: Session_13386269553009841.14.drString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.windows.netFindAccountProviderWithAuthorityAsyncMalformed
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://m.kugou.com/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://m.soundcloud.com/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://m.vk.com/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://mail.google.com/mail/mu/mp/266/#tl/Inbox
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://manifestdeliveryservice.edgebrowser.microsoft-staging-falcon.io/app/page-context-demo
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://music.amazon.com
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://music.apple.com
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://music.yandex.com
Source: 000003.log0.14.drString found in binary or memory: https://ntp.msn.com/
Source: Session_13386269553009841.14.drString found in binary or memory: https://ntp.msn.com/edge/ntp?locale=en-GB&title=New%20tab&dsp=1&sp=Bing
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://open.spotify.com
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.live.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.live.com/mail/0/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.live.com/mail/compose?isExtension=true
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.live.com/mail/inbox?isExtension=true&sharedHeader=1&nlp=1&client_flight=outlookedge
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.office.com/calendar/view/agenda/quickcapture/moreDetails?isExtension=true
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.office.com/mail/0/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.office.com/mail/compose?isExtension=true
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://outlook.office.com/mail/inbox?isExtension=true&sharedHeader=1&client_flight=outlookedge
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://powerpoint.new?from=EdgeM365Shoreline
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://tidal.com/
Source: 000003.log0.14.drString found in binary or memory: https://ts1.mm.bing.net/th?id=OVP.ZyxBFwll1ny463qrrKuN6AEkII&amp;pid=15.1&amp;W=89&amp;H=160&quot;
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://twitter.com/
Source: edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1.14.drString found in binary or memory: https://unitedstates1.ss.wd.microsoft.us/
Source: edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1.14.drString found in binary or memory: https://unitedstates2.ss.wd.microsoft.us/
Source: edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1.14.drString found in binary or memory: https://unitedstates4.ss.wd.microsoft.us/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://vibe.naver.com/today
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://web.skype.com/?browsername=edge_canary_shoreline
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://web.skype.com/?browsername=edge_stable_shoreline
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://web.telegram.org/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://web.whatsapp.com
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://word.new?from=EdgeM365Shoreline
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.deezer.com/
Source: content_new.js.14.dr, content.js.14.drString found in binary or memory: https://www.google.com/chrome
Source: Web Data.14.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.iheart.com/podcast/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.instagram.com
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.last.fm/
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.messenger.com
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.msn.com/widgets/fullpage/cgSideBar/widget?experiences=CasualGamesHub&sharedHeader=1
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.msn.com/widgets/fullpage/cgSideBar/widget?experiences=CasualGamesHub&sharedHeader=1&game
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.msn.com/widgets/fullpage/cgSideBar/widget?experiences=CasualGamesHub&sharedHeader=1&item
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.msn.com/widgets/fullpage/gaming/widget?experiences=CasualGamesHub&sharedHeader=1
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.msn.com/widgets/fullpage/gaming/widget?experiences=CasualGamesHub&sharedHeader=1&item=fl
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.msn.com/widgets/fullpage/gaming/widget?experiences=CasualGamesHub&sharedHeader=1&playInS
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.office.com
Source: Top Sites.14.drString found in binary or memory: https://www.office.com/
Source: Top Sites.14.drString found in binary or memory: https://www.office.com/Office
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.officeplus.cn/?sid=shoreline&endpoint=OPPC&source=OPCNshoreline
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.onenote.com/stickynotes?isEdgeHub=true
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.onenote.com/stickynotes?isEdgeHub=true&auth=1
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.onenote.com/stickynotes?isEdgeHub=true&auth=2
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.onenote.com/stickynotesstaging?isEdgeHub=true
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.onenote.com/stickynotesstaging?isEdgeHub=true&auth=1
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.onenote.com/stickynotesstaging?isEdgeHub=true&auth=2
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.tiktok.com/
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp, ntkrnlmp.exe.0.drString found in binary or memory: https://www.windows.com/stopcode
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://www.youtube.com
Source: 000003.log0.14.drString found in binary or memory: https://www.youtube.com/watch?v=Gx9sPUXs1zI&quot;
Source: 000003.log0.14.drString found in binary or memory: https://www.youtube.com/watch?v=ifj6gpW5agw&quot;
Source: ffe0fdb2-741b-4728-a2cf-e5c53a23ba17.tmp.14.drString found in binary or memory: https://y.music.163.com/m/
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49837 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49868 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.253.33.254:443 -> 192.168.2.4:49867 version: TLS 1.2
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_c693bfe0-a

Operating System Destruction

barindex
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: 01 00 00 00 Jump to behavior

System Summary

barindex
Source: pid.kvai.exeStatic PE information: section name: z<,>$#
Source: pid.kvai.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB09500_2_00007FFC3DDB0950
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB5D080_2_00007FFC3DDB5D08
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB5C380_2_00007FFC3DDB5C38
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB5B9F0_2_00007FFC3DDB5B9F
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB07750_2_00007FFC3DDB0775
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB32FC0_2_00007FFC3DDB32FC
Source: ntkrnlmp.exe.0.drStatic PE information: Number of sections : 33 > 10
Source: mfc140ita.dll.0.drStatic PE information: No import functions for PE file found
Source: mfc110ita.dll.0.drStatic PE information: No import functions for PE file found
Source: mfc110jpn.dll.0.drStatic PE information: No import functions for PE file found
Source: mfc140jpn.dll.0.drStatic PE information: No import functions for PE file found
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUpdateHeartbeat.dllv+ vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInputSwitch.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2611286803.0000000002D93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevdsldr.exej% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindows.UI.Input.Inking.Analysis.dllT vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameactiveds.TLBj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDirectXDatabaseUpdater.exej% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBitLockerCSP.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.00000000127B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePSMServiceExtHost.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefhshl.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTokenBroker.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: DefaultCapeDefaultCapLeapSecondsEnabledKVF_HotPatchSimulationProductVersionOriginalFilenameInternalNameLegalCopyrightFileDescriptionCompanyNameProductNameFileVersion\StringFileInfo\000004B0\\StringFileInfo\000004E4\\StringFileInfo\040904B0\\StringFileInfo\040904E4\\REGISTRY\USER vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindows.Networking.ServiceDiscovery.Dnssd.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTenantRestrictionsPlugin.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUPPrinterInstallsCSP.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenametrkwks.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2590325408.0000000000A8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSearchIndexer.exe@ vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2590325408.0000000000A8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSearchIndexer.exe.mui@ vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentkrnlmp.exej% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemstscax.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAppXDeploymentClient.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesrumsvc.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AslStringDuplicate failed [%x]AslFileMappingCreateRtlDosPathNameToNtPathName_U_WithStatus failed for %S [%x]RtlFileMapInitializeByFilePath failed %S [%x]NtQueryInformationFile failed [%x]AslpFileMappingGetFileKind failed %S [%x]AslFileMappingEnsureMappedAsAslFileMappingEnsureAslFileMappingEnsure failed [%x]AslFileMappingGetImageTypeExAslpFileGetImageNtHeader failed [%x]Failed to find the Cor20HeaderException encountered [%x]File mapping invalid [%x]AslpFileMappingGetFileKindAslFileMappingGetFileKindDetailUnhandled ASL_FILE_KIND: %dAslFileMappingGetImageTypeEx failed [%x]\SystemRoot\AslpFileLargeEnsureLargeFileMapping failed [%x]AslFileAllocAndGetAttributesAslpFileGetVersionAttributes failed [%x]AslpFileGetFileKindDetailAttribute failed [%x]AslpFileGetHeaderAttributesPE failed [%x]AslpFileGetPeExportNameExeWrapper failed [%x]AslpFileGetClrVersionAttribute failed [%x]AslpFileGetHeaderAttributesNE failed [%x]AslpFileGetChecksumAttributes failed [%x]AslpFileGetVersionBlock failed [%x]AslpFileGetVersionAttributesAslpFileMakeStringVersionAttributes failed [%x]AslpFileGetVersionBlockRtlFileMapMapView failed [%x]Re-mapped file as image to get version block: %lsFoundDid not find%ls version block after re-mapping as image [%x]LdrResFindResource failed [%x]LdrResFindResource failed %ls [%x]LdrResFindResource returned null version block with status: [%x]Version block has bad sizeVersion block out of rangeVS_VERSION_INFOVersion block invalidException retrieving version block [%x] for '%ls'ProductVersionFileDescriptionCompanyNameProductNameFileVersionOriginalFilenameInternalNameLegalCopyrightAslpFileVerQueryBlock failed [%x]AslpFileMakeStringVersionAttributesAslStringXmlSanitize failed [%x]AslpFileQueryVersionString failed [%x]AslpFileVerQueryBlockVersionBlock is too longVersionBlock not long enough\StringFileInfo\000004B0\\StringFileInfo\000004E4\\StringFileInfo\040904B0\\StringFileInfo\040904E4\RtlStringCchCopyW failed [%x]AslpFileQueryVersionStringRtlStringCchCatW failed [%x]\StringFileInfo\%04X%04X\%sRtlStringCchPrintfW failed [%x]AslpFileGetPeExportNameExeWrapperAslpFileGetHeaderAttributesPEAslpFileGetHeaderAttributesNEAslpFileGetNtHeaderAttributesFile mapping not a PE [%x]AslpFileGetImageNtHeaderAslpFileGetExeWrapperAslpFileHasActiveMarkWrapper failed (FileSize: %I64u) [%x]AslpFileHasActiveMarkWrapper failed [%x].securomAslpFileHasActiveMarkWrapper.ps4AslpFileQueryExportName failed [%x]AslpFileGetExportNameAslStringAnsiToUnicode failed [%x]AslpFileQueryExportNameRtlImageDirectoryEntryToData returned ExportDirectory that was too smallExport directory pointer invalid (points to location outside file), invalid image formatExport directory invalid or invalid image formatRtlStringCchCopyA failed [%x]AslpFileQuery16BitDescription failed [%x]AslpFileGet16BitDescriptionAslpFileQuery16BitModuleName failed [%x]AslpFileGet16BitModuleNameFile mapping invalidAslpFileQuery16BitDescriptionAslpFileQuery16BitModuleNameAslpFileGetChecksumAttributes called with a partial v
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepcwutl.dllj% vs pid.kvai.exe
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUFAT.DLLj% vs pid.kvai.exe
Source: pid.kvai.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: mfc110ita.dll.0.drStatic PE information: Section .rsrc
Source: mfc110jpn.dll.0.drStatic PE information: Section .rsrc
Source: pid.kvai.exeStatic PE information: Section: z<,>$# ZLIB complexity 1.000359375
Source: ntkrnlmp.exe.0.drBinary string: \Device\Unknownnt!store memory compression
Source: ntkrnlmp.exe.0.drBinary string: \Device\FileInfo
Source: ntkrnlmp.exe.0.drBinary string: \Device\Harddisk%d\Partition0
Source: ntkrnlmp.exe.0.drBinary string: \\Device\Ramdisk%wZ
Source: ntkrnlmp.exe.0.drBinary string: \Device\VRegDriver
Source: ntkrnlmp.exe.0.drBinary string: \Device\HarddiskVolume
Source: ntkrnlmp.exe.0.drBinary string: \Device\Mup
Source: ntkrnlmp.exe.0.drBinary string: \Device\PhysicalMemory
Source: ntkrnlmp.exe.0.drBinary string: \KernelObjects\MemoryPartition0\Device\RawDisk\Device\RawTape\Device\RawCdRom
Source: ntkrnlmp.exe.0.drBinary string: \Device\ahcache\Registry\Machine\System\LastKnownGoodRecovery\LastGood.Tmp
Source: ntkrnlmp.exe.0.drBinary string: FullProcessInformationSID\Registry\Machine\SYSTEM\CurrentControlSet\Control\Windows\Device\UwfvolControl
Source: ntkrnlmp.exe.0.drBinary string: \Registry\Machine\System\CurrentControlSet\Control\Compatibility\Device\Registry\Machine\System\CurrentControlSet\Control\Compatibility
Source: ntkrnlmp.exe.0.drBinary string: \Device\Harddisk%lu\Partition%lu
Source: ntkrnlmp.exe.0.drBinary string: SyspartGetPhysicalPartitions failed with error code: %x\Device\Harddisk%u\Partition%u
Source: ntkrnlmp.exe.0.drBinary string: \Device\%08lx
Source: ntkrnlmp.exe.0.drBinary string: \Registry\Machine\System\SetupProductType\Registry\Machine\System\CurrentControlSet\Control\ProductOptionsSystemPrefixSetupTypeProductSuiteWinNTServerNTLanmanNTEnterpriseSmall BusinessConcurrentLimit\Registry\Machine\System\CurrentControlSet\Services\LicenseInfoSuitesTerminal ServerSmall Business(Restricted)BackOfficeCommunicationServerBladePersonalDataCenterEmbeddedNTCompute ServerStorage ServerSecurity ApplianceEmbedded(Restricted)Kernel-ProductTypePhoneNTSystemSetupInProgressWH Server\Callback\SetSystemTime\Callback\EnlightenmentState\Callback\Phase1InitComplete\Callback\ProcessorAdd\Callback\PowerState\Callback\SetSystemState\Callback\SeImageVerificationDriverInfoProductPolicy\Callback\LicensingDataCloudbookDeviceIDOSProductContentIdOSProductPfnConsumeAddonPolicySetSecurity-SPP-IgnoreDeferredActivationCloudbookDeviceLockedClip-SubscriptionPFN\SystemRoot\System32\locale.nls\Registry\Machine\SYSTEM\CurrentControlSet\Control\Nls\NLSTableVersion\Registry\Machine\System\CurrentControlSet\Control\Notifications\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\VolatileNotifications\REGISTRY\MACHINE\OSDATA\Notifications\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\NotificationsMemPersistOfflineDisableOfflineMemPfaTimeoutMemPfaThresholdMemPfaPageCountMemPfaDisableRestoreCmciErrorLimitRestoreCmciMaxAttemptsRestoreCmciEnabledIgnoreDummyWriteCMCPollingLimitCMCThresholdSecondsCMCThresholdCountKernel-NonGenuineNotificationStringIdsKernel-NonGenuineNotificationType\Registry\Machine\System\CurrentControlSet\Control\7503491f-4a39-4f84-b231-8aca3e203b94$Kernel.Purge.AppxFICacheSecurity-SPP-GenuineLocalStatusDriverDateDataDriverVersionMatchingDeviceIdProviderNameEnumPropPages32CoInstallers32DriverDescInfPathInfSectionInfSectionExtInstaller32NoInstallClassNoDisplayClassSilentInstallResourcePickerTagsResourcePickerExceptionsIncludedInfsIconDHPRebalanceOptOutLastDeleteDateFSFilterClassDeviceReportedNoUseClassDefault ServiceIconPathLowerLogoVersionInstallFlags\Device\LanmanRedirector\Device\VMBus\{4d12e519-17a0-4ae4-8eaa-5270fc6abdb7}-{dcc079ae-60ba-4d07-847c-3493609c0870}-0000\Device\vmsmb\Silos
Source: ntkrnlmp.exe.0.drBinary string: \Device\RdyBoost
Source: ntkrnlmp.exe.0.drBinary string: \Device\CdRom%d\Device\Harddisk%d\Partition0
Source: ntkrnlmp.exe.0.drBinary string: Eventlog-System\Device\WindowsTrustedRT\{699AA2F1-A42E-40DF-BABE-3AAAD2BB6A47}\Device\SysEnv
Source: ntkrnlmp.exe.0.drBinary string: \Device\%s\Partition%lu\??\PhysicalDrive%lu
Source: ntkrnlmp.exe.0.drBinary string: \Device\CdRom%d\ArcName\%s
Source: ntkrnlmp.exe.0.drBinary string: \Device\DeviceApi
Source: ntkrnlmp.exe.0.drBinary string: \Device\Harddisk%lu\Partition0
Source: ntkrnlmp.exe.0.drBinary string: \\Device\HarddiskVolume%lu
Source: ntkrnlmp.exe.0.drBinary string: \Device\Device\BootDevice
Source: ntkrnlmp.exe.0.drBinary string: \Device\VolumesSafeForWriteAccess
Source: ntkrnlmp.exe.0.drBinary string: \Device\OSDataDevice
Source: ntkrnlmp.exe.0.drBinary string: \??\C:\Device\MountPointManager
Source: ntkrnlmp.exe.0.drBinary string: \Device\Ramdisk%wZ
Source: ntkrnlmp.exe.0.drBinary string: \Device\Harddisk%d\Partition%d
Source: ntkrnlmp.exe.0.drBinary string: \Driver\WMIxWDM\Device\WMIDataDevice
Source: ntkrnlmp.exe.0.drBinary string: \Device\CdRom%d
Source: ntkrnlmp.exe.0.drBinary string: \Device\MountPointManager
Source: ntkrnlmp.exe.0.drBinary string: \Device\NamedPipeY
Source: ntkrnlmp.exe.0.drBinary string: \Device\Ramdisk
Source: classification engineClassification label: mal100.spre.evad.winEXE@71/342@17/17
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67D1B26D-2040.pmaJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeMutant created: NULL
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Temp\2bd9697b-8ec1-4bb7-b02c-252142d83314.tmpJump to behavior
Source: C:\Windows\System32\userinit.exeProcess created: C:\Windows\explorer.exe
Source: C:\Windows\System32\userinit.exeProcess created: C:\Windows\explorer.exe
Source: pid.kvai.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\pid.kvai.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\UserLanguageProfileCallback.dll
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _ApplicationID, _Revision, _WorkId, Package, "Index", ApplicationType, Flags, Subsystem, PackageRelativeApplicationId, ApplicationUserModelId, DisplayName, Description, Square150x150Logo, Square44x44Logo, Wide310x150Logo, Square310x310Logo, Square71x71Logo, ForegroundText, BackgroundColor, Activation, HostId, Executable, Entrypoint, StartPage, ResourceGroup, LockScreenNotification, LockScreenBadgeLogo, SplashScreenImage, SplashScreenBackgroundColor, InitialRotationPreference, ApplicationViewMinWidth, AppListEntry, EditionId, VisualGroup, Parameters, _Dictionary FROM Application WHERE Package=? AND PackageRelativeApplicationId=? AND _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _Revision, _WorkId, Application, "Index", Category, Activation, HostId, Executable, Entrypoint, RuntimeType, StartPage, ResourceGroup, Flags, Subsystem, Parameters, _LocalizedDictionary, _Dictionary FROM ApplicationExtension WHERE _ApplicationExtensionID=? AND (_WorkId=0 OR _WorkId=?) ORDER BY _WorkId DESC;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _PackageID, _Revision, _WorkId, PackageFamily, ResourceId, Architecture, Version, PackageFullName, IsInbox, PackageType, Flags, Flags2, DisplayName, PublisherDisplayName, Description, Logo, OSMinVersion, OSMaxVersionTested, TargetDeviceFamily, Capabilities, SupportedUsers, SignatureOrigin, PackageOrigin, Enterprise, SourceBundle, EditionId, OSVersionWhenIndexed, InPlaceUpdateBaseline, _Dictionary FROM Package WHERE _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _PackageLocationID, _Revision, _WorkId, Package, Volume, InstalledLocation, MutableLink, MutableLocation, _Dictionary FROM PackageLocation WHERE Package=? AND _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO FileTypeAssociation (_Revision, _WorkId, FileType, ContentType, Extension, "Index", ProgID, _Dictionary) VALUES(?,?,?,?,?,?,?,?);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO Protocol (_Revision, _WorkId, ProtocolName, ReturnResults, Extension, "Index", ProgID, _Dictionary) VALUES(?,?,?,?,?,?,?,?);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE ApplicationExtension SET _Revision=?, _WorkId=?, Application=?, "Index"=?, Category=?, Activation=?, HostId=?, Executable=?, Entrypoint=?, RuntimeType=?, StartPage=?, ResourceGroup=?, Flags=?, Subsystem=?, Parameters=?, _LocalizedDictionary=?, _Dictionary=? WHERE _ApplicationExtensionID=? AND _Revision=? AND _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _ApplicationExtensionID, _Revision, _WorkId, Application, "Index", Category, Activation, HostId, Executable, Entrypoint, RuntimeType, StartPage, ResourceGroup, Flags, Subsystem, Parameters, _LocalizedDictionary, _Dictionary FROM ApplicationExtension WHERE Application=? AND "Index"=? AND _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _PackageID, _Revision, _WorkId, PackageFamily, ResourceId, Architecture, Version, PackageFullName, IsInbox, PackageType, Flags, Flags2, DisplayName, PublisherDisplayName, Description, Logo, OSMinVersion, OSMaxVersionTested, TargetDeviceFamily, Capabilities, SupportedUsers, SignatureOrigin, PackageOrigin, Enterprise, SourceBundle, EditionId, OSVersionWhenIndexed, InPlaceUpdateBaseline, _Dictionary FROM Package WHERE (_WorkId=0 OR _WorkId=?);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _ApplicationExtensionID, _Revision, _WorkId, Application, "Index", Category, Activation, HostId, Executable, Entrypoint, RuntimeType, StartPage, ResourceGroup, Flags, Subsystem, Parameters, _LocalizedDictionary, _Dictionary FROM ApplicationExtension WHERE Application=? AND "Index"=? AND (_WorkId=0 OR _WorkId=?) ORDER BY _WorkId DESC;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _PackageExternalLocationID, _Revision, _WorkId, User, Package, Path, _Dictionary FROM PackageExternalLocation WHERE User=? AND Package=? AND _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _Revision, _WorkId, Application, "Index", Category, Activation, HostId, Executable, Entrypoint, RuntimeType, StartPage, ResourceGroup, Flags, Subsystem, Parameters, _LocalizedDictionary, _Dictionary FROM ApplicationExtension WHERE _ApplicationExtensionID=? AND _WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _ApplicationID, _Revision, _WorkId, Package, "Index", ApplicationType, Flags, Subsystem, PackageRelativeApplicationId, ApplicationUserModelId, DisplayName, Description, Square150x150Logo, Square44x44Logo, Wide310x150Logo, Square310x310Logo, Square71x71Logo, ForegroundText, BackgroundColor, Activation, HostId, Executable, Entrypoint, StartPage, ResourceGroup, LockScreenNotification, LockScreenBadgeLogo, SplashScreenImage, SplashScreenBackgroundColor, InitialRotationPreference, ApplicationViewMinWidth, AppListEntry, EditionId, VisualGroup, Parameters, _Dictionary FROM Application WHERE Package=? AND PackageRelativeApplicationId=? AND (_WorkId=0 OR _WorkId=?) ORDER BY _WorkId DESC;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT ae._ApplicationExtensionID, ae._Revision, ae._WorkId, ae.Application, ae."Index", ae.Category, ae.Activation, ae.HostId, ae.Executable, ae.Entrypoint, ae.RuntimeType, ae.StartPage, ae.ResourceGroup, ae.Flags, ae.Subsystem, ae.Parameters, ae._LocalizedDictionary, ae._Dictionary FROM ApplicationExtension AS ae INNER JOIN Application AS a ON a._ApplicationID=ae.Application WHERE ae.Flags & ?2 != 0 AND a.ApplicationUserModelId=?1 AND (ae._WorkId=0 OR ae._WorkId=?3) AND (a._WorkId=0 OR a._WorkId=?3);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE ApplicationExtension SET _Revision=?, _WorkId=?, Application=?, "Index"=?, Category=?, Activation=?, HostId=?, Executable=?, Entrypoint=?, RuntimeType=?, StartPage=?, ResourceGroup=?, Flags=?, Subsystem=?, Parameters=?, _LocalizedDictionary=?, _Dictionary=? WHERE _ApplicationExtensionID=? AND _Revision=? AND (_WorkId=0 OR _WorkId=?);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT EXISTS(SELECT 1 FROM ApplicationExtension WHERE _ApplicationExtensionID=? AND (_WorkId=0 OR _WorkId=?) LIMIT 1);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT EXISTS(SELECT 1 FROM ApplicationExtension WHERE _ApplicationExtensionID=? AND _WorkId=0 LIMIT 1);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT ae._ApplicationExtensionID, ae._Revision, ae._WorkId, ae.Application, ae."Index", ae.Category, ae.Activation, ae.HostId, ae.Executable, ae.Entrypoint, ae.RuntimeType, ae.StartPage, ae.ResourceGroup, ae.Flags, ae.Subsystem, ae.Parameters, ae._LocalizedDictionary, ae._Dictionary FROM ApplicationExtension AS ae INNER JOIN Application AS a ON a._ApplicationID=ae.Application WHERE ae.Flags & ?2 != 0 AND a.ApplicationUserModelId=?1 AND ae._WorkId=0 AND a._WorkId=0;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO AppUriHandlerGroup (_Revision, _WorkId, Name, Extension, _Dictionary) VALUES(?,?,?,?,?);
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _Revision, ActivationKey, Flags, HostId, Executable, Entrypoint, RuntimeType, StartPage, ResourceGroup, _Dictionary FROM Activation WHERE _ActivationID=?;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _PackageLocationID, _Revision, _WorkId, Package, Volume, InstalledLocation, MutableLink, MutableLocation, _Dictionary FROM PackageLocation WHERE Package=? AND (_WorkId=0 OR _WorkId=?) ORDER BY _WorkId DESC;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT _PackageExternalLocationID, _Revision, _WorkId, User, Package, Path, _Dictionary FROM PackageExternalLocation WHERE User=? AND Package=? AND (_WorkId=0 OR _WorkId=?) ORDER BY _WorkId DESC;
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO AppUriHandler (_Revision, _WorkId, HostName, Extension, ProgID, AppUriHandlerGroup, _Dictionary) VALUES(?,?,?,?,?,?,?);
Source: Login Data.14.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: pid.kvai.exeVirustotal: Detection: 69%
Source: pid.kvai.exeReversingLabs: Detection: 65%
Source: unknownProcess created: C:\Users\user\Desktop\pid.kvai.exe "C:\Users\user\Desktop\pid.kvai.exe"
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\UserLanguageProfileCallback.dll
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\winethc.dll
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\PickerPlatform.dll
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=528882
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\sechost.dll
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:3
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\txfw32.dll
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6556 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6756 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\provengine.dll
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\tvratings.dll
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8344 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8344 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\userinit.exe "C:\Windows\system32\userinit.exe"
Source: C:\Windows\System32\userinit.exeProcess created: C:\Windows\explorer.exe C:\Windows\Explorer.EXE
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\XboxNetApiSvc.dll
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-GB --service-sandbox-type=collections --mojo-platform-channel-handle=2580 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\UserLanguageProfileCallback.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\winethc.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\PickerPlatform.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\sechost.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\txfw32.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\provengine.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\tvratings.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\userinit.exe "C:\Windows\system32\userinit.exe" Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\XboxNetApiSvc.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6556 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6756 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8344 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=8344 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-GB --service-sandbox-type=collections --mojo-platform-channel-handle=2580 --field-trial-handle=2088,i,10365707062960969891,1768502364186994778,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\userinit.exeProcess created: C:\Windows\explorer.exe C:\Windows\Explorer.EXE
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: ksuser.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: avrt.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: audioses.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: midimap.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: twinui.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\System32\userinit.exeSection loaded: userinitext.dll
Source: C:\Windows\System32\userinit.exeSection loaded: userenv.dll
Source: C:\Windows\System32\userinit.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\userinit.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\userinit.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\userinit.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exeSection loaded: aepic.dll
Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
Source: C:\Windows\explorer.exeSection loaded: userenv.dll
Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exeSection loaded: propsys.dll
Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
Source: C:\Windows\explorer.exeSection loaded: wininet.dll
Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
Source: C:\Windows\explorer.exeSection loaded: wldp.dll
Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
Source: C:\Windows\explorer.exeSection loaded: netutils.dll
Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
Source: C:\Windows\explorer.exeSection loaded: profapi.dll
Source: C:\Windows\explorer.exeSection loaded: edputil.dll
Source: C:\Windows\explorer.exeSection loaded: apphelp.dll
Source: C:\Windows\explorer.exeSection loaded: appresolver.dll
Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dll
Source: C:\Windows\explorer.exeSection loaded: slc.dll
Source: C:\Windows\explorer.exeSection loaded: sppc.dll
Source: C:\Windows\explorer.exeSection loaded: starttiledata.dll
Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dll
Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dll
Source: C:\Windows\explorer.exeSection loaded: cscui.dll
Source: C:\Windows\explorer.exeSection loaded: structuredquery.dll
Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dll
Source: C:\Windows\explorer.exeSection loaded: icu.dll
Source: C:\Windows\explorer.exeSection loaded: mswb7.dll
Source: C:\Windows\explorer.exeSection loaded: windows.storage.search.dll
Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
Source: C:\Windows\explorer.exeSection loaded: actxprxy.dll
Source: C:\Windows\explorer.exeSection loaded: wintypes.dll
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Users\user\Desktop\pid.kvai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeFile opened: C:\Windows\system32\msftedit.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\pid.kvai.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: pid.kvai.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: pid.kvai.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: DirectXDatabaseUpdater.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: mstscax.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\vccorlib140.amd64.pdb source: vccorlib140.dll.0.dr
Source: Binary string: UPPrinterInstallsCSP.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Networking.ServiceDiscovery.DnsSd.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: AppXDeploymentClient.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: vdsldr.pdb source: pid.kvai.exe, 00000000.00000002.2611286803.0000000002D93000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: BitLockerCSP.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ntkrnlmp.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp, ntkrnlmp.exe.0.dr
Source: Binary string: BitLockerCSP.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: MFCM120.amd64.pdb8@ source: mfcm120.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140_atomic_wait.amd64.pdb source: msvcp140_atomic_wait.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: vcruntime140.dll.0.dr
Source: Binary string: Windows.UI.Input.Inking.Analysis.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: PsmServiceExtHost.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.00000000127B8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: fhshl.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: vdsldr.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2611286803.0000000002D93000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: srumsvc.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ufat.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: vcruntime140_1.dll.0.dr
Source: Binary string: msvcp120.amd64.pdb source: msvcp120.dll.0.dr
Source: Binary string: fhshl.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Networking.ServiceDiscovery.DnsSd.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\msvcp140_atomic_wait.amd64.pdbGCTL source: msvcp140_atomic_wait.dll.0.dr
Source: Binary string: InputSwitch.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: mfc120.amd64.pdb source: mfc120.dll.0.dr
Source: Binary string: pcwutl.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: msclmd.pdb source: msclmd.dll.0.dr
Source: Binary string: PsmServiceExtHost.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.00000000127B8000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: vcruntime140_1.dll.0.dr
Source: Binary string: MFCM120U.amd64.pdb source: mfcm120u.dll.0.dr
Source: Binary string: srumsvc.pdbUGP source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\vccorlib140.amd64.pdbGCTL source: vccorlib140.dll.0.dr
Source: Binary string: ntkrnlmp.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012ECE000.00000004.00000800.00020000.00000000.sdmp, ntkrnlmp.exe.0.dr
Source: Binary string: MFCM120U.amd64.pdb8@ source: mfcm120u.dll.0.dr
Source: Binary string: mstscax.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: pcwutl.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: vcruntime140.dll.0.dr
Source: Binary string: ufat.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: MFCM120.amd64.pdb source: mfcm120.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\MFC140JPN.amd64.pdb source: mfc140jpn.dll.0.dr
Source: Binary string: UpdateHeartbeat.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: TenantRestrictionsPlugin.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: AppXDeploymentClient.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Management.InprocObjects.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\MFC140ITA.amd64.pdb source: mfc140ita.dll.0.dr
Source: Binary string: msclmd.pdbGCTL source: msclmd.dll.0.dr
Source: Binary string: InputSwitch.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: UPPrinterInstallsCSP.pdb source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: Windows.Management.InprocObjects.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: TenantRestrictionsPlugin.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000012968000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: DirectXDatabaseUpdater.pdbGCTL source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014437000.00000004.00000800.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\pid.kvai.exeUnpacked PE file: 0.2.pid.kvai.exe.400000.0.unpack z<,>$#:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
Source: pid.kvai.exeStatic PE information: 0xB45B54DF [Thu Nov 19 19:26:23 2065 UTC]
Source: initial sampleStatic PE information: section where entry point is pointing to: PAGELK
Source: msvcp120.dll.0.drStatic PE information: real checksum: 0xacc61 should be: 0xa5c63
Source: mfc140ita.dll.0.drStatic PE information: real checksum: 0x1bc4e should be: 0x1bb6b
Source: mfc110ita.dll.0.drStatic PE information: real checksum: 0x1ebbf should be: 0x1edbd
Source: mfcm120.dll.0.drStatic PE information: real checksum: 0x251d3 should be: 0x25203
Source: mfc120.dll.0.drStatic PE information: real checksum: 0x568600 should be: 0x564e30
Source: msvcp140_atomic_wait.dll.0.drStatic PE information: real checksum: 0x11849 should be: 0x1aa93
Source: mfc110jpn.dll.0.drStatic PE information: real checksum: 0x12522 should be: 0x1c223
Source: pid.kvai.exeStatic PE information: real checksum: 0x0 should be: 0x626eb
Source: vccorlib140.dll.0.drStatic PE information: real checksum: 0x5cbbf should be: 0x5cb47
Source: mfcm120u.dll.0.drStatic PE information: real checksum: 0x1aebe should be: 0x24a22
Source: vcruntime140.dll.0.drStatic PE information: real checksum: 0x1bf13 should be: 0x24926
Source: pid.kvai.exeStatic PE information: section name: z<,>$#
Source: pid.kvai.exeStatic PE information: section name:
Source: vcruntime140.dll.0.drStatic PE information: section name: _RDATA
Source: mfcm120u.dll.0.drStatic PE information: section name: .nep
Source: mfcm120.dll.0.drStatic PE information: section name: .nep
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PROTDATA
Source: ntkrnlmp.exe.0.drStatic PE information: section name: GFIDS
Source: ntkrnlmp.exe.0.drStatic PE information: section name: Pad1
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGELK
Source: ntkrnlmp.exe.0.drStatic PE information: section name: POOLCODE
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGEKD
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGEVRFY
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGEHDLS
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGEBGFX
Source: ntkrnlmp.exe.0.drStatic PE information: section name: INITKDBG
Source: ntkrnlmp.exe.0.drStatic PE information: section name: TRACESUP
Source: ntkrnlmp.exe.0.drStatic PE information: section name: KVASCODE
Source: ntkrnlmp.exe.0.drStatic PE information: section name: RETPOL
Source: ntkrnlmp.exe.0.drStatic PE information: section name: MINIEX
Source: ntkrnlmp.exe.0.drStatic PE information: section name: Pad2
Source: ntkrnlmp.exe.0.drStatic PE information: section name: ALMOSTRO
Source: ntkrnlmp.exe.0.drStatic PE information: section name: CACHEALI
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGEDATA
Source: ntkrnlmp.exe.0.drStatic PE information: section name: PAGEVRFD
Source: ntkrnlmp.exe.0.drStatic PE information: section name: INITDATA
Source: ntkrnlmp.exe.0.drStatic PE information: section name: Pad3
Source: ntkrnlmp.exe.0.drStatic PE information: section name: CFGRO
Source: ntkrnlmp.exe.0.drStatic PE information: section name: Pad4
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00404346 push rdx; retf 0_2_00404349
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00403451 push rbp; retf 0_2_00403459
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00402161 push rbp; iretd 0_2_00402164
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_0040296D push rbp; ret 0_2_00402973
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_0040648F push rsi; retf 0_2_00406490
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_0040359A push rcx; retf 0_2_004035CB
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_004039BB push rbp; retf 0_2_004039BC
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_004032BC push FFFFFF8Fh; retf 0_2_004032BE
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB00BD pushad ; iretd 0_2_00007FFC3DDB00C1
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB10A5 push ds; retf 0_2_00007FFC3DDB10A6
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB0C63 pushfd ; retf 0_2_00007FFC3DDB0C64
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB106F push ds; retf 0_2_00007FFC3DDB1072
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB66BC push edx; retf 0_2_00007FFC3DDB66BD
Source: pid.kvai.exeStatic PE information: section name: z<,>$# entropy: 7.998587759168759

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfcm120u.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\vccorlib140.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc140jpn.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc140ita.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc110ita.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\msclmd.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfcm120.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc110jpn.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\msvcp140_atomic_wait.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeSystem file written: C:\Windows\System32\mfc120.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeFile written: \Device\Harddisk0\DR0 offset: 512Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeFile written: \Device\Harddisk0\DR0 offset: 512 length: 512Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfcm120u.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\vccorlib140.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc140jpn.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc140ita.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\ntkrnlmp.exeJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc110ita.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\vcruntime140.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\vcruntime140_1.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\msclmd.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\msvcp120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfcm120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\msvcp140_atomic_wait.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc110jpn.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfcm120u.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\vccorlib140.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc140jpn.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc140ita.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\ntkrnlmp.exeJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc110ita.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\vcruntime140.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\vcruntime140_1.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\msclmd.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\msvcp120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfcm120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\msvcp140_atomic_wait.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc110jpn.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeFile created: C:\Windows\System32\mfc120.dllJump to dropped file
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeMemory allocated: 990000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeMemory allocated: 1A7B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfcm120u.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\vccorlib140.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfc140jpn.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfc140ita.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\ntkrnlmp.exeJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfc110ita.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\vcruntime140_1.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\vcruntime140.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\msclmd.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\msvcp120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfcm120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfc110jpn.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\msvcp140_atomic_wait.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exeDropped PE file which has not been started: C:\Windows\System32\mfc120.dllJump to dropped file
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7948Thread sleep time: -172000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7480Thread sleep time: -46360s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7480Thread sleep time: -40306s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7480Thread sleep time: -56700s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7480Thread sleep time: -47593s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7480Thread sleep time: -44110s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exe TID: 7480Thread sleep time: -45134s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\pid.kvai.exeThread delayed: delay time: 46360Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeThread delayed: delay time: 40306Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeThread delayed: delay time: 56700Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeThread delayed: delay time: 47593Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeThread delayed: delay time: 44110Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeThread delayed: delay time: 45134Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\pid.kvai.exeCode function: 0_2_00007FFC3DDB0635 CheckRemoteDebuggerPresent,0_2_00007FFC3DDB0635
Source: C:\Users\user\Desktop\pid.kvai.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeSection loaded: NULL target: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe protection: readonlyJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\UserLanguageProfileCallback.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\winethc.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\PickerPlatform.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\sechost.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\txfw32.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\provengine.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\tvratings.dllJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\userinit.exe "C:\Windows\system32\userinit.exe" Jump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Windows\system32\XboxNetApiSvc.dllJump to behavior
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ITfLangBarMgr creation failedShell_TrayWndReBarWindow32ITfLangBarMgr::GetShowFloatingStatus failedRdpXInterfaceRemoteAppCore::sendRailPdu failedRailLanguageBarDeskBandCiceroUIWndFrame-TF_FloatingLangBar_WndTitle
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000014E37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Keyboard Layout\ToggleKeyboard Layout\ShowToast03B5835F-F03C-411B-9CE2-AA23E1171E36shell\ext\inputswitch\switch\inputswitchui.cppmainModeTilePressedModeTileDisabledModeTileInactiveModalityTilePressedModalityTileDisabledIsolatedButtonIsolatedButtonPressedSettingsLinkButtonModeTileScrollViewerModeTileContainerModalityAreaSeparatorModalityTileContainerModalityAreaInfoAreaInputSwitchAccRootsliderShell_TrayWndms-settings:regionlanguageModalityIconShortModalityTileColorPrevalenceSOFTWARE\Microsoft\Windows\CurrentVersion\Themes\PersonalizeTileContextMenuWindowMessage<toast duration="long" launch="%s"> <visual> <binding template="ToastGeneric"> <text id="1">%s</text> <text id="2" hint-maxLines="4">%s</text> </binding> </visual> <actions> <action activationType="foreground" arguments="Customize" content="%s"/> <action activationType="foreground" arguments="Dismiss" content="%s"/> </actions> </toast>Microsoft.Windows.InputSwitchToastHandlerNonImmersivePackageSWITCH_SOURCE_HOTKEY_FORWARDSWITCH_SOURCE_HOTKEY_PREVIOUSSWITCH_SOURCE_HOTKEY_REVERSESWITCH_SOURCE_HOTKEY_ADVANCEDSWITCH_SOURCE_SHORTCUTSWITCH_SOURCE_UI_DESKTOPSWITCH_SOURCE_UI_LOGONUISWITCH_SOURCE_UI_UACSWITCH_SOURCE_UI_OOBESWITCH_SOURCE_UI_TOUCHKEYBOARDSWITCH_SOURCE_UI_SETTINGSPANESWITCH_SOURCE_UI_OTHERSWITCH_SOURCE_OTHEROOPModeIndicatorShowUIonecore\internal\sdk\inc\wil\Resource.hInputSwitchNotificationShownActivatePostponedProfileActivateProfileRetryAfterZeroInputProfilesFromTsf
Source: pid.kvai.exe, 00000000.00000002.2629407794.0000000013A37000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_traywnd
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Users\user\Desktop\pid.kvai.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\pid.kvai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
112
Process Injection
11
Masquerading
11
Input Capture
12
Security Software Discovery
1
Taint Shared Content
11
Input Capture
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job2
Bootkit
1
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory2
Process Discovery
Remote Desktop Protocol1
Archive Collected Data
3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
41
Virtualization/Sandbox Evasion
Security Account Manager41
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive4
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook112
Process Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture15
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets22
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Bootkit
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Rundll32
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
Software Packing
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Timestomp
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
DLL Side-Loading
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1636350 Sample: pid.kvai.exe Startdate: 12/03/2025 Architecture: WINDOWS Score: 100 42 star-azurefd-prod.trafficmanager.net 2->42 44 shed.dual-low.s-part-0039.t-0009.t-msedge.net 2->44 46 7 other IPs or domains 2->46 58 Antivirus / Scanner detection for submitted sample 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 PE file contains section with special chars 2->62 64 2 other signatures 2->64 8 pid.kvai.exe 2 3 2->8         started        12 msedge.exe 81 606 2->12         started        signatures3 process4 dnsIp5 34 C:\Windows\System32\vcruntime140_1.dll, PE32+ 8->34 dropped 36 C:\Windows\System32\vcruntime140.dll, PE32+ 8->36 dropped 38 C:\Windows\System32\vccorlib140.dll, PE32+ 8->38 dropped 40 12 other files (10 malicious) 8->40 dropped 66 Detected unpacking (changes PE section rights) 8->66 68 Protects its processes via BreakOnTermination flag 8->68 70 Writes directly to the primary disk partition (DR0) 8->70 74 3 other signatures 8->74 15 userinit.exe 8->15         started        17 rundll32.exe 8->17         started        19 rundll32.exe 8->19         started        28 6 other processes 8->28 54 192.168.2.4, 138, 443, 49708 unknown unknown 12->54 56 239.255.255.250 unknown Reserved 12->56 72 Maps a DLL or memory area into another process 12->72 21 msedge.exe 12->21         started        24 msedge.exe 12->24         started        26 msedge.exe 12->26         started        30 3 other processes 12->30 file6 signatures7 process8 dnsIp9 32 explorer.exe 15->32         started        48 18.164.116.122, 443, 49815, 49840 MIT-GATEWAYSUS United States 21->48 50 13.107.5.80, 443, 49797, 49798 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 21->50 52 17 other IPs or domains 21->52 process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.