Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 05:08 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html
-
Size
11KB
-
MD5
f062479ed0329e142ae1bb8d80a90b7a
-
SHA1
161d9a8ff319f0473aac07779d839b67c919e0c1
-
SHA256
e69ed3268932df85218beb5037af0b7d3a6a94ba35a531f12e99acb2c4f72c81
-
SHA512
e2d63a0bdeb9bfb91438e7ebf971642da55f3bfa5bb1b93681e72cf9a6f78828c645ec1a3c5fd3759f3779d7b1f8592efc42b8f4e12709d6a336d844ec965948
-
SSDEEP
192:E6L+nVaKbKAOlIKlzNCAKf62XV106gYi7OdFYB9lTta+IOUYfX6p4x9iClnDj0oe:PCZOlIKlzNCSODaOHIlM+Fv4GUknLh4N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 4444 msedge.exe 4444 msedge.exe 1116 identity_helper.exe 1116 identity_helper.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 2828 4444 msedge.exe 85 PID 4444 wrote to memory of 2828 4444 msedge.exe 85 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3816 4444 msedge.exe 86 PID 4444 wrote to memory of 3820 4444 msedge.exe 87 PID 4444 wrote to memory of 3820 4444 msedge.exe 87 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88 PID 4444 wrote to memory of 4836 4444 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa73ff46f8,0x7ffa73ff4708,0x7ffa73ff47182⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9928577670628048548,6517116940038980094,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
Network
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.197.17.2.in-addr.arpaIN PTRResponse240.197.17.2.in-addr.arpaIN PTRa2-17-197-240deploystaticakamaitechnologiescom
-
Remote address:142.250.178.2:80RequestGET /pagead/show_ads.js HTTP/1.1
Host: pagead2.googlesyndication.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
DNT: 1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Timing-Allow-Origin: *
Cross-Origin-Resource-Policy: cross-origin
Vary: Accept-Encoding
Date: Mon, 15 Apr 2024 05:08:29 GMT
Expires: Mon, 15 Apr 2024 05:08:29 GMT
Cache-Control: private, max-age=3600
Content-Type: text/javascript; charset=UTF-8
ETag: 8943815255915775562
X-Content-Type-Options: nosniff
Content-Disposition: attachment; filename="f.txt"
Content-Encoding: gzip
Server: cafe
Content-Length: 10862
X-XSS-Protection: 0
-
Remote address:8.8.8.8:53Requestsutra.aleby.ruIN AResponse
-
Remote address:8.8.8.8:53Requestgoogleads.g.doubleclick.netIN AResponsegoogleads.g.doubleclick.netIN A142.250.200.2
-
GEThttps://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2702700111134563&output=html&h=600&adk=1955916166&adf=871843527&w=120&lmt=1713157709&ad_type=text_image&format=120x600_as&color_bg=EAD6EF&color_border=6E008B&color_link=333333&color_text=000000&color_url=333333&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709162&bpp=265&bdt=321&idt=445&shv=r20240410&mjsv=m202404020101&ptt=5&saldr=sd&abxe=1&correlator=631603664292&frm=20&pv=2&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=838&ady=21&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865%2C31082671&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=d%7C%7CeE%7C&abl=CS&pfx=0&fu=0&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=1&uci=a!1&fsb=1&dtd=476msedge.exeRemote address:142.250.200.2:443RequestGET /pagead/ads?client=ca-pub-2702700111134563&output=html&h=600&adk=1955916166&adf=871843527&w=120&lmt=1713157709&ad_type=text_image&format=120x600_as&color_bg=EAD6EF&color_border=6E008B&color_link=333333&color_text=000000&color_url=333333&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709162&bpp=265&bdt=321&idt=445&shv=r20240410&mjsv=m202404020101&ptt=5&saldr=sd&abxe=1&correlator=631603664292&frm=20&pv=2&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=838&ady=21&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865%2C31082671&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=d%7C%7CeE%7C&abl=CS&pfx=0&fu=0&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=1&uci=a!1&fsb=1&dtd=476 HTTP/2.0
host: googleads.g.doubleclick.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
upgrade-insecure-requests: 1
dnt: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: cross-site
sec-fetch-mode: navigate
sec-fetch-dest: iframe
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
GEThttps://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2702700111134563&output=html&adk=1812271804&adf=3025194257&lmt=1713157709&plat=1%3A1024%2C2%3A1024%2C3%3A2097152%2C4%3A2097152%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&pra=7&wgl=1&easpi=0&asro=0&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709427&bpp=2&bdt=586&idt=226&shv=r20240410&mjsv=m202404020101&ptt=9&saldr=aa&abxe=1&prev_fmts=120x600_as&nras=1&correlator=631603664292&frm=20&pv=1&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=-12245933&ady=-12245933&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fsapi=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=32768&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=2&uci=a!2&fsb=1&dtd=233msedge.exeRemote address:142.250.200.2:443RequestGET /pagead/ads?client=ca-pub-2702700111134563&output=html&adk=1812271804&adf=3025194257&lmt=1713157709&plat=1%3A1024%2C2%3A1024%2C3%3A2097152%2C4%3A2097152%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&pra=7&wgl=1&easpi=0&asro=0&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709427&bpp=2&bdt=586&idt=226&shv=r20240410&mjsv=m202404020101&ptt=9&saldr=aa&abxe=1&prev_fmts=120x600_as&nras=1&correlator=631603664292&frm=20&pv=1&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=-12245933&ady=-12245933&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fsapi=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=32768&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=2&uci=a!2&fsb=1&dtd=233 HTTP/2.0
host: googleads.g.doubleclick.net
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
upgrade-insecure-requests: 1
dnt: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: cross-site
sec-fetch-mode: navigate
sec-fetch-dest: iframe
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request2.178.250.142.in-addr.arpaIN PTRResponse2.178.250.142.in-addr.arpaIN PTRlhr48s27-in-f21e100net
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.200.250.142.in-addr.arpaIN PTRResponse2.200.250.142.in-addr.arpaIN PTRlhr48s29-in-f21e100net
-
Remote address:8.8.8.8:53Requesttpc.googlesyndication.comIN AResponsetpc.googlesyndication.comIN A142.250.200.33
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=3C100A7CD82169B71D011E1ED99A68E7; domain=.bing.com; expires=Sat, 10-May-2025 05:08:30 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: B2AA85E9A8AF4BE8BF8B40188B0B58C5 Ref B: LON04EDGE0819 Ref C: 2024-04-15T05:08:30Z
date: Mon, 15 Apr 2024 05:08:30 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3C100A7CD82169B71D011E1ED99A68E7
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=5jptKOOeg4KRWYMLVGKcPuFzDiRB_mDMNyvs1MhycpI; domain=.bing.com; expires=Sat, 10-May-2025 05:08:31 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 429886475C2C43C1B8518804EBE42E99 Ref B: LON04EDGE0819 Ref C: 2024-04-15T05:08:31Z
date: Mon, 15 Apr 2024 05:08:30 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=3C100A7CD82169B71D011E1ED99A68E7; MSPTC=5jptKOOeg4KRWYMLVGKcPuFzDiRB_mDMNyvs1MhycpI
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: CCE639710EBE4BE381898CB0F7EE967A Ref B: LON04EDGE0819 Ref C: 2024-04-15T05:08:31Z
date: Mon, 15 Apr 2024 05:08:30 GMT
-
Remote address:142.250.200.33:443RequestGET /sodar/sodar2.js HTTP/2.0
host: tpc.googlesyndication.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.178.4
-
Remote address:142.250.178.4:443RequestGET /recaptcha/api2/aframe HTTP/2.0
host: www.google.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
sec-ch-ua-mobile: ?0
upgrade-insecure-requests: 1
dnt: 1
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: cross-site
sec-fetch-mode: navigate
sec-fetch-dest: iframe
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request33.200.250.142.in-addr.arpaIN PTRResponse33.200.250.142.in-addr.arpaIN PTRlhr48s30-in-f11e100net
-
Remote address:8.8.8.8:53Request4.178.250.142.in-addr.arpaIN PTRResponse4.178.250.142.in-addr.arpaIN PTRlhr48s27-in-f41e100net
-
Remote address:8.8.8.8:53Request21.114.53.23.in-addr.arpaIN PTRResponse21.114.53.23.in-addr.arpaIN PTRa23-53-114-21deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
834 B 12.0kB 11 14
HTTP Request
GET http://pagead2.googlesyndication.com/pagead/show_ads.jsHTTP Response
200 -
142.250.200.2:443https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2702700111134563&output=html&adk=1812271804&adf=3025194257&lmt=1713157709&plat=1%3A1024%2C2%3A1024%2C3%3A2097152%2C4%3A2097152%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&pra=7&wgl=1&easpi=0&asro=0&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709427&bpp=2&bdt=586&idt=226&shv=r20240410&mjsv=m202404020101&ptt=9&saldr=aa&abxe=1&prev_fmts=120x600_as&nras=1&correlator=631603664292&frm=20&pv=1&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=-12245933&ady=-12245933&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fsapi=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=32768&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=2&uci=a!2&fsb=1&dtd=233tls, http2msedge.exe3.9kB 7.5kB 20 22
HTTP Request
GET https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2702700111134563&output=html&h=600&adk=1955916166&adf=871843527&w=120&lmt=1713157709&ad_type=text_image&format=120x600_as&color_bg=EAD6EF&color_border=6E008B&color_link=333333&color_text=000000&color_url=333333&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&wgl=1&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709162&bpp=265&bdt=321&idt=445&shv=r20240410&mjsv=m202404020101&ptt=5&saldr=sd&abxe=1&correlator=631603664292&frm=20&pv=2&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=838&ady=21&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865%2C31082671&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=d%7C%7CeE%7C&abl=CS&pfx=0&fu=0&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=1&uci=a!1&fsb=1&dtd=476HTTP Request
GET https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2702700111134563&output=html&adk=1812271804&adf=3025194257&lmt=1713157709&plat=1%3A1024%2C2%3A1024%2C3%3A2097152%2C4%3A2097152%2C9%3A32776%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C41%3A32%2C42%3A32&format=0x0&url=file%3A%2F%2F%2FC%3A%2FUsers%2FAdmin%2FAppData%2FLocal%2FTemp%2Ff062479ed0329e142ae1bb8d80a90b7a_JaffaCakes118.html&pra=7&wgl=1&easpi=0&asro=0&uach=WyJXaW5kb3dzIiwiMTAuMCIsIng4NiIsIiIsIjkyLjAuOTAyLjY3IixudWxsLDAsbnVsbCwiIixudWxsLDBd&dt=1713157709427&bpp=2&bdt=586&idt=226&shv=r20240410&mjsv=m202404020101&ptt=9&saldr=aa&abxe=1&prev_fmts=120x600_as&nras=1&correlator=631603664292&frm=20&pv=1&ga_vid=1619641810.1713157710&ga_sid=1713157710&ga_hid=33514436&ga_fc=0&u_tz=0&u_his=1&u_h=720&u_w=1280&u_ah=680&u_aw=1280&u_cd=24&u_sd=1&dmc=8&adx=-12245933&ady=-12245933&biw=1263&bih=609&scr_x=0&scr_y=0&eid=44759875%2C44759926%2C44759842%2C95328447%2C44795921%2C95325974%2C31082656%2C95320376%2C95321865&oid=2&pvsid=194668787931579&tmod=181241784&wsm=1&uas=0&nvt=1&fsapi=1&fc=896&brdim=0%2C0%2C0%2C0%2C1280%2C0%2C1280%2C680%2C1280%2C609&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=32768&bc=31&bz=1&psd=W251bGwsbnVsbCxudWxsLDNd&ifi=2&uci=a!2&fsb=1&dtd=233 -
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=tls, http22.0kB 9.2kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=0e6559435ad34aa9996e41f3e665d3ae&localId=w:19F07DA7-5FDD-B751-CD70-D7618FCDFF22&deviceId=6755467521684215&anid=HTTP Response
204 -
2.0kB 13.6kB 21 21
HTTP Request
GET https://tpc.googlesyndication.com/sodar/sodar2.js -
2.0kB 7.8kB 17 20
HTTP Request
GET https://www.google.com/recaptcha/api2/aframe
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
240.197.17.2.in-addr.arpa
-
60 B 121 B 1 1
DNS Request
sutra.aleby.ru
-
73 B 89 B 1 1
DNS Request
googleads.g.doubleclick.net
DNS Response
142.250.200.2
-
72 B 110 B 1 1
DNS Request
2.178.250.142.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
72 B 110 B 1 1
DNS Request
2.200.250.142.in-addr.arpa
-
71 B 87 B 1 1
DNS Request
tpc.googlesyndication.com
DNS Response
142.250.200.33
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.178.4
-
4.2kB 12.6kB 14 15
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
73 B 111 B 1 1
DNS Request
33.200.250.142.in-addr.arpa
-
72 B 110 B 1 1
DNS Request
4.178.250.142.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
21.114.53.23.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
519 B 8
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5029a3ac1fd5a1274420405ccee7c08e2
SHA10178a91cd5d7fa353c48e76d2c0530acf68126a9
SHA25682733725409e8325fec69dc1bc7b969f9a4b592a6601ad653c26f4a02d431520
SHA5128aab8c81af8764229314efcd90666c9e52173b25470e1dded7776bdef639ce0982bd5338ad92dd3f95c799bebbfec8cb3ce3671ae34a2e466faa545aab043073
-
Filesize
1KB
MD5ed1da81321d83b624314853b47446503
SHA1eeda537a417c3f63306bd2a9337a6a0da42bb8b7
SHA256abf7db6d0c76c018a37204728349bd543a3e3f5833ee046ecccc21fb8a4aeb90
SHA5124b9a4552f321f5f999f6534c044930168f6e35a921e5d3604e6be201626084ae69793fa3827e7f7ad429768319561252a87c89bba41c644ed3246b95f81030ab
-
Filesize
6KB
MD5cad869f5565cab998ce2345837cff4fb
SHA18314c1f1f2a3d9b0ee6df09381d4eb3c2bb72f97
SHA256b22608285a65bbda090b98eeca1156fa2745b84322d259e4a813e48ecc5fdcac
SHA512eedd720be510b0ef925d0144d1e898c07392326148a7359b5d8dd7dfcef54e14e7a5d70fcd5547ae81d8f1c7e639dd5dea9e89acd1b500aa8377d441ea621013
-
Filesize
6KB
MD50cb250443758f09eff6d7f9e1156e77f
SHA14a9ca7a10ebd10968aab0e129882a0285a8f4fa7
SHA256c9b25d668cf51754a6f99dce4b9bbde0f1a37108dd480bc5badc19ce668574eb
SHA512286af384d8800e65978cca150be2f0f637b7f59249f65a2983b3ff4ae0f09fb3a4669ce2b81fd3ca899f8a4f3f21bed14a2933490696571ba7baf69400224f30
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD520dc88d162d0faa764dd935a736afd2b
SHA17fd7e43036928f1a69b2425d5f80e2fabb6da53b
SHA25626c35e1a6d41f141a1b0fc78c9c7fdda09e51b145932067c471662d144a83933
SHA512f744cc58b62193b39dae65e8dad2b39f980000ee2d2c64fac5201b0591a445fc33883b81d9dce11463f67d17cad5307c32e8d3e9bc0e0c37598dd1e4cd1e04e7