Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 06:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3e3469a3cd9a8c778801e94841772658_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e3469a3cd9a8c778801e94841772658_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e3469a3cd9a8c778801e94841772658_JaffaCakes118.html
-
Size
10KB
-
MD5
3e3469a3cd9a8c778801e94841772658
-
SHA1
e41848dc0bf984a9ee0d8c0a3eb6d677ae5443bb
-
SHA256
0b4b48856c8c89449e3996cda24a1c682381f8d8b615a72f991af65877505bf2
-
SHA512
1195208a118337540b956c087fe5c3771f053935f2f3ce936470de82d5f8c0efc3f77b8cf3aeee4a852b4b406450a9ba9cb58c6b4d98a5f2a5538ea2ba4fe6bc
-
SSDEEP
192:WdPcnmptsPHRtBKORs9N2OqtM9z1erV7JNpCL6:WdsBKgs9NGM9RehdNc6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 4028 msedge.exe 4028 msedge.exe 332 identity_helper.exe 332 identity_helper.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1872 4028 msedge.exe 84 PID 4028 wrote to memory of 1872 4028 msedge.exe 84 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 3356 4028 msedge.exe 85 PID 4028 wrote to memory of 1892 4028 msedge.exe 86 PID 4028 wrote to memory of 1892 4028 msedge.exe 86 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87 PID 4028 wrote to memory of 2740 4028 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e3469a3cd9a8c778801e94841772658_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8e1246f8,0x7ffd8e124708,0x7ffd8e1247182⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15728490965940329524,13565053732545361722,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
Network
-
Remote address:8.8.8.8:53Requestimages-na.ssl-images-amazon.comIN AResponseimages-na.ssl-images-amazon.comIN CNAMEm.media-amazon.comm.media-amazon.comIN CNAMEtp.c47710ee9-frontier.media-amazon.comtp.c47710ee9-frontier.media-amazon.comIN CNAMEa.media-amazon.coma.media-amazon.comIN CNAMEa.media-amazon.com.akamaized.neta.media-amazon.com.akamaized.netIN CNAMEa1994.dscr.akamai.neta1994.dscr.akamai.netIN A2.19.117.7a1994.dscr.akamai.netIN A2.19.117.31
-
GEThttps://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUI-af9e9b82cae7003c8a1d2f2e239005b802c674a4._V2_.cssmsedge.exeRemote address:2.19.117.7:443RequestGET /images/G/01/AUIClients/AmazonUI-af9e9b82cae7003c8a1d2f2e239005b802c674a4._V2_.css HTTP/2.0
host: images-na.ssl-images-amazon.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: text/css,*/*;q=0.1
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: style
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: text/css; charset=utf-8
x-amz-ir-id: 44d52c36-a0d9-474c-8fa0-79653f3867cb
last-modified: Fri, 05 Feb 2016 03:02:58 GMT
surrogate-key: x-cache-887 /images/G/01/AUIClients/AmazonUI-af9e9b82cae7003c8a1d2f2e239005b802c674a4
x-nginx-cache-status: MISS
content-encoding: br
content-length: 16221
peer-cache: Hit
cache-control: public, max-age=630720000
expires: Sat, 08 Oct 2044 06:05:17 GMT
date: Sun, 13 Oct 2024 06:05:17 GMT
alt-svc: h3=":443"; ma=93600
x-cache: Miss from akamai
akamai-grn: 0.874bdd58.1728799517.3573e1bd
server-timing: provider;desc="ak"
timing-allow-origin: https://www.amazon.in, https://www.amazon.com
akamai-cache-status: Miss from child, Hit from parent
access-control-allow-origin: *
-
GEThttps://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUIBaseCSS-sprite_1x-8fe8c701c7a6f38368f97a8a3f04d5f25875be4d._V2_.pngmsedge.exeRemote address:2.19.117.7:443RequestGET /images/G/01/AUIClients/AmazonUIBaseCSS-sprite_1x-8fe8c701c7a6f38368f97a8a3f04d5f25875be4d._V2_.png HTTP/2.0
host: images-na.ssl-images-amazon.com
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Microsoft Edge";v="92"
dnt: 1
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67
accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
referer: https://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUI-af9e9b82cae7003c8a1d2f2e239005b802c674a4._V2_.css
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 200
content-type: image/png
content-length: 24594
x-amz-ir-id: eab785b0-b129-4fc1-920f-1afe6bf5a2ce
last-modified: Tue, 20 Oct 2015 02:26:17 GMT
surrogate-key: x-cache-548 /images/G/01/AUIClients/AmazonUIBaseCSS-sprite_1x-8fe8c701c7a6f38368f97a8a3f04d5f25875be4d
x-nginx-cache-status: HIT
accept-ranges: bytes
peer-cache: Hit
cache-control: public, max-age=630720000
expires: Sat, 08 Oct 2044 06:05:18 GMT
date: Sun, 13 Oct 2024 06:05:18 GMT
alt-svc: h3=":443"; ma=93600
x-cache: Hit from akamai
akamai-grn: 0.874bdd58.1728799517.3573e28e
server-timing: provider;desc="ak"
timing-allow-origin: https://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUI-af9e9b82cae7003c8a1d2f2e239005b802c674a4._V2_.css
akamai-cache-status: Miss from child, Hit from parent
access-control-allow-origin: *
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request7.117.19.2.in-addr.arpaIN PTRResponse7.117.19.2.in-addr.arpaIN PTRa2-19-117-7deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.117.19.2.in-addr.arpaIN PTRResponse75.117.19.2.in-addr.arpaIN PTRa2-19-117-75deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
2.19.117.7:443https://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUIBaseCSS-sprite_1x-8fe8c701c7a6f38368f97a8a3f04d5f25875be4d._V2_.pngtls, http2msedge.exe2.9kB 48.7kB 33 52
HTTP Request
GET https://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUI-af9e9b82cae7003c8a1d2f2e239005b802c674a4._V2_.cssHTTP Response
200HTTP Request
GET https://images-na.ssl-images-amazon.com/images/G/01/AUIClients/AmazonUIBaseCSS-sprite_1x-8fe8c701c7a6f38368f97a8a3f04d5f25875be4d._V2_.pngHTTP Response
200
-
77 B 268 B 1 1
DNS Request
images-na.ssl-images-amazon.com
DNS Response
2.19.117.72.19.117.31
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.159.190.20.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
7.117.19.2.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
467 B 7
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
75.117.19.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
199B
MD5a930469f55e79fef199b597e4e4066d1
SHA1e36d892c13d21d508028408212b00aab81f2b498
SHA256612e7af1c7fd882ba0e0fdb5ce2d44e7ff5bd6f3d2280777d0ac6d39be66683c
SHA512f187499a61fdc6dd44c0c747674cc82931806aca27274de805f526217cf5b52c2796b42c4910f545a1eb9a23e234f82eeec0ed67dd8dd4ed1a245cef9230fbf7
-
Filesize
6KB
MD520a7b7b08c031243f26c679e39ac7e96
SHA19761fda94edc40a8471fcf1fad0589de64acdb6a
SHA256dd7a2c55bae684675fca4acfea34a8af65b559944acec3a352487d4012acc22c
SHA51214d0beeb5284d1b4b97e89c7619271a134914395b409134fb6d1d450cdf8bf43a6faf053adf4cead0e75acfc70df26c6cd98cf7da86f5d441b5d2596d864e33a
-
Filesize
6KB
MD5951739901c6adbf817965359928d8248
SHA10e4e01ff3e3dadba6a8047a8b26c7327b39d1414
SHA2561451dbce1fbdc704b56249da6c4342cb4d966591260785b1b3bf2bf224aee9dd
SHA512203805f04fa107012928287d6da700443938a483b1fe76e62ac0214fca49dd292eef5d8455bb308c0715e20a4320399b5494e12bae2a64c10ed7cc88a4875e04
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c4fd50df4b5cc7f471b9f96ad3afcb68
SHA1dc0c3a9b67976d0e752385cf821254f74f9df748
SHA256d58d3524871338a122cd768673f84f257bb7946bf01d1b95a9dd69c2a6be7bf0
SHA51200498616a3c96566c31145de2b52c372da8f926e0102fe85850fc44f735e3e59fe5a2c19ddb5585753c5684824f81beac58fa829a79424057217513c0372bcae