Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 18:31 UTC
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231020-en
General
-
Target
file.exe
-
Size
749KB
-
MD5
ad1f4ef175202d30916a890305ca230b
-
SHA1
b9382557bb2eb93cde8ff52ece9ee1e58372ef99
-
SHA256
ca45f40c10f30d2c60b2ab67afffc295763d61c890f92b4bc71885d96ac56e18
-
SHA512
9c2da2f37dabf3a29172a31f742b6d068b7c5e54e00c43aa00f5a6d6a0db23f4cf7edce71717126029a048dbd539132910917b61d06585bc4207bd09b4330bd3
-
SSDEEP
12288:F9IGRHPCWz+KoCAObHpto+VQUN4TYc0Q70xocaSyE8pnMsnW7EQdHZJCtIv/:RyCAqbPQUN4sEsaS6VMs+57JCt
Malware Config
Extracted
djvu
http://zexeq.com/test2/get.php
-
extension
.eqza
-
offline_id
MI4io8cIlhyYsGaDxoKsbpWzfIe5lGPE0dYtrht1
- payload_url
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-Y6UIMfI736 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0825eQesA
Signatures
-
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral2/memory/3688-2-0x00000000023C0000-0x00000000024DB000-memory.dmp family_djvu behavioral2/memory/4752-3-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4752-4-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4752-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4752-6-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4752-16-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3728-21-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3728-22-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3728-24-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation file.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2260 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\3efaf606-1199-493a-ade4-3fb708a3ddc8\\file.exe\" --AutoStart" file.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 api.2ip.ua 41 api.2ip.ua -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3688 set thread context of 4752 3688 file.exe 99 PID 3116 set thread context of 3728 3116 file.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1600 3728 WerFault.exe 108 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4752 file.exe 4752 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 744 svchost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 3688 wrote to memory of 4752 3688 file.exe 99 PID 4752 wrote to memory of 2260 4752 file.exe 100 PID 4752 wrote to memory of 2260 4752 file.exe 100 PID 4752 wrote to memory of 2260 4752 file.exe 100 PID 4752 wrote to memory of 3116 4752 file.exe 102 PID 4752 wrote to memory of 3116 4752 file.exe 102 PID 4752 wrote to memory of 3116 4752 file.exe 102 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108 PID 3116 wrote to memory of 3728 3116 file.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\3efaf606-1199-493a-ade4-3fb708a3ddc8" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 5685⤵
- Program crash
PID:1600
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3728 -ip 37281⤵PID:916
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:744
Network
-
Remote address:8.8.8.8:53Request76.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request35.77.123.92.in-addr.arpaIN PTRResponse35.77.123.92.in-addr.arpaIN PTRa92-123-77-35deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request158.240.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.52.96.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.156.103.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.1.85.104.in-addr.arpaIN PTRResponse198.1.85.104.in-addr.arpaIN PTRa104-85-1-198deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapi.2ip.uaIN AResponseapi.2ip.uaIN A188.114.96.0api.2ip.uaIN A188.114.97.0
-
Remote address:188.114.96.0:443RequestGET /geo.json HTTP/1.1
User-Agent: Microsoft Internet Explorer
Host: api.2ip.ua
ResponseHTTP/1.1 200 OK
Content-Type: application/json
Transfer-Encoding: chunked
Connection: keep-alive
strict-transport-security: max-age=63072000; preload
x-frame-options: SAMEORIGIN
x-content-type-options: nosniff
x-xss-protection: 1; mode=block; report=...
access-control-allow-origin: *
access-control-allow-methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
access-control-allow-headers: X-Accept-Charset,X-Accept,Content-Type
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2FNF5quhvRiXL%2FvDIDgGXmb3Z%2BMzKGFFyWCk6OtYvyZKLdg2klM5f4OFpv3jA%2FiM2aPeQgPBQ4TQ20ksvWIHIZU3ghgfhb4FkAe1QYrMAt1J6vlZRM04SzubvE0zn"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 82699200dd640b90-AMS
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request0.96.114.188.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request135.1.85.104.in-addr.arpaIN PTRResponse135.1.85.104.in-addr.arpaIN PTRa104-85-1-135deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request126.211.247.8.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301187_1ZYFA7XNBG4NK6SSZ&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301187_1ZYFA7XNBG4NK6SSZ&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 212146
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 922C66D166884B46BD87488162C86189 Ref B: BRU30EDGE0809 Ref C: 2023-11-15T18:31:44Z
date: Wed, 15 Nov 2023 18:31:43 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301727_159BWLGFMENWVBHQV&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301727_159BWLGFMENWVBHQV&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 362493
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 7FD836AAC71044E8A13D283FAF7D0EC9 Ref B: BRU30EDGE0809 Ref C: 2023-11-15T18:31:44Z
date: Wed, 15 Nov 2023 18:31:43 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 365925
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E6F6DA3FA23247849646E712F824968E Ref B: BRU30EDGE0809 Ref C: 2023-11-15T18:31:44Z
date: Wed, 15 Nov 2023 18:31:43 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 345334
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A6D88F0585E6458DB686A45FE608E8AB Ref B: BRU30EDGE0809 Ref C: 2023-11-15T18:31:44Z
date: Wed, 15 Nov 2023 18:31:43 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301318_1C2BO4PEAXMAW3R9U&pid=21.2&w=1920&h=1080&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301318_1C2BO4PEAXMAW3R9U&pid=21.2&w=1920&h=1080&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 409991
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 2ED1088C1F304B9BB9D86B01D363B8D2 Ref B: BRU30EDGE0809 Ref C: 2023-11-15T18:31:44Z
date: Wed, 15 Nov 2023 18:31:43 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301596_1DG6BQP8IZK93D1X4&pid=21.2&w=1080&h=1920&c=4Remote address:204.79.197.200:443RequestGET /th?id=OADD2.10239317301596_1DG6BQP8IZK93D1X4&pid=21.2&w=1080&h=1920&c=4 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 246785
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 8F774D6B53C24301A3FE9D99BD120C5F Ref B: BRU30EDGE0809 Ref C: 2023-11-15T18:31:45Z
date: Wed, 15 Nov 2023 18:31:44 GMT
-
Remote address:8.8.8.8:53Request25.77.123.92.in-addr.arpaIN PTRResponse25.77.123.92.in-addr.arpaIN PTRa92-123-77-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request4.173.189.20.in-addr.arpaIN PTRResponse
-
1.2kB 7.5kB 17 12
HTTP Request
GET https://api.2ip.ua/geo.jsonHTTP Response
200 -
1.2kB 8.3kB 16 14
-
204.79.197.200:443https://tse1.mm.bing.net/th?id=OADD2.10239317301596_1DG6BQP8IZK93D1X4&pid=21.2&w=1080&h=1920&c=4tls, http268.6kB 2.0MB 1466 1459
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301187_1ZYFA7XNBG4NK6SSZ&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301727_159BWLGFMENWVBHQV&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317300941_1T733J08WF3629NM7&pid=21.2&w=1920&h=1080&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301374_13OLU7GJIAZBI3QGK&pid=21.2&w=1080&h=1920&c=4HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301318_1C2BO4PEAXMAW3R9U&pid=21.2&w=1920&h=1080&c=4HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301596_1DG6BQP8IZK93D1X4&pid=21.2&w=1080&h=1920&c=4HTTP Response
200 -
1.2kB 8.3kB 16 14
-
1.2kB 8.3kB 16 14
-
1.2kB 8.3kB 16 14
-
71 B 157 B 1 1
DNS Request
76.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
35.77.123.92.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
158.240.127.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.52.96.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
88.156.103.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
198.1.85.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
56 B 88 B 1 1
DNS Request
api.2ip.ua
DNS Response
188.114.96.0188.114.97.0
-
71 B 133 B 1 1
DNS Request
0.96.114.188.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
135.1.85.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
126.211.247.8.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
62 B 173 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
204.79.197.20013.107.21.200
-
71 B 135 B 1 1
DNS Request
25.77.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
4.173.189.20.in-addr.arpa