Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/01/2024, 18:59 UTC
240122-xnavaschg6 1022/01/2024, 18:56 UTC
240122-xlm2vacchp 322/01/2024, 18:52 UTC
240122-xjdemaccgm 4Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 18:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
GTA 5 Web Cursor.cur
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
GTA 5 Web Cursor.cur
Resource
win10v2004-20231215-en
General
-
Target
GTA 5 Web Cursor.cur
-
Size
4KB
-
MD5
ff6de1c4f3bc8fec42883a51f23c9df7
-
SHA1
3297b0be81fa0cd2828412d625e5655b3c12b62d
-
SHA256
588178fd381b8616491f4830aab4c0520d83b2bc02b4484ec8a484b11923ed0b
-
SHA512
4cdd6b57a79498a0304fd08f2ae347d34702de0cc53d00a8524c1f5494588c6290949c93f845698bdc40ac347f5285785410a413160c596714d07a5af884b03b
-
SSDEEP
24:NYLM+Or3GqJF1pVu/2uEwuwLwuwuqVwuzwmwYwYwYwYwQDbqqqqc:NfzjGqtfI2SB8Bt2F5bbbbsbqqqqc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504234216672835" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe Token: SeShutdownPrivilege 4688 chrome.exe Token: SeCreatePagefilePrivilege 4688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe 4688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2336 4688 chrome.exe 97 PID 4688 wrote to memory of 2336 4688 chrome.exe 97 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 3428 4688 chrome.exe 98 PID 4688 wrote to memory of 1840 4688 chrome.exe 99 PID 4688 wrote to memory of 1840 4688 chrome.exe 99 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100 PID 4688 wrote to memory of 4604 4688 chrome.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\GTA 5 Web Cursor.cur"1⤵PID:852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffa4fbd9758,0x7ffa4fbd9768,0x7ffa4fbd97782⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:22⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4636 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4852 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4924 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5176 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3460 --field-trial-handle=1700,i,17872334164117161513,481181938566328971,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4040
Network
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A216.58.204.68
-
Remote address:216.58.204.68:443RequestGET /async/ddljson?async=ntp:2 HTTP/2.0
host: www.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request195.187.250.142.in-addr.arpaIN PTRResponse195.187.250.142.in-addr.arpaIN PTRlhr25s33-in-f31e100net
-
Remote address:8.8.8.8:53Request68.204.58.216.in-addr.arpaIN PTRResponse68.204.58.216.in-addr.arpaIN PTRlhr25s13-in-f41e100net68.204.58.216.in-addr.arpaIN PTRlhr48s49-in-f4�G68.204.58.216.in-addr.arpaIN PTRlhr25s13-in-f68�G
-
Remote address:8.8.8.8:53Request74.169.217.172.in-addr.arpaIN PTRResponse74.169.217.172.in-addr.arpaIN PTRlhr48s09-in-f101e100net
-
Remote address:8.8.8.8:53Request227.187.250.142.in-addr.arpaIN PTRResponse227.187.250.142.in-addr.arpaIN PTRlhr25s34-in-f31e100net
-
Remote address:8.8.8.8:53Requestclients2.google.comIN AResponseclients2.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A142.250.179.238
-
GEThttps://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=106.0.5249.119&lang=en-US&acceptformat=crx3&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.62.0%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D38%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D38%2526e%253D1chrome.exeRemote address:142.250.179.238:443RequestGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=106.0.5249.119&lang=en-US&acceptformat=crx3&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.62.0%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D38%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D38%2526e%253D1 HTTP/2.0
host: clients2.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request238.179.250.142.in-addr.arpaIN PTRResponse238.179.250.142.in-addr.arpaIN PTRlhr25s31-in-f141e100net
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request16.234.44.23.in-addr.arpaIN PTRResponse16.234.44.23.in-addr.arpaIN PTRa23-44-234-16deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request147.166.122.92.in-addr.arpaIN PTRResponse147.166.122.92.in-addr.arpaIN PTRa92-122-166-147deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestbeacons.gcp.gvt2.comIN AResponsebeacons.gcp.gvt2.comIN CNAMEbeacons-handoff.gcp.gvt2.combeacons-handoff.gcp.gvt2.comIN A192.178.49.3
-
Remote address:192.178.49.3:443RequestPOST /domainreliability/upload HTTP/2.0
host: beacons.gcp.gvt2.com
content-length: 273
content-type: application/json; charset=utf-8
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request3.49.178.192.in-addr.arpaIN PTRResponse3.49.178.192.in-addr.arpaIN PTRphx18s08-in-f31e100net
-
Remote address:8.8.8.8:53Request90.65.42.20.in-addr.arpaIN PTRResponse
-
156 B 3
-
1.7kB 7.5kB 16 18
HTTP Request
GET https://www.google.com/async/ddljson?async=ntp:2 -
142.250.179.238:443https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=106.0.5249.119&lang=en-US&acceptformat=crx3&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.62.0%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D38%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D38%2526e%253D1tls, http2chrome.exe2.1kB 9.9kB 18 20
HTTP Request
GET https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=106.0.5249.119&lang=en-US&acceptformat=crx3&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.62.0%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D38%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D38%2526e%253D1 -
2.0kB 7.1kB 15 15
HTTP Request
POST https://beacons.gcp.gvt2.com/domainreliability/upload
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
216.58.204.68
-
3.3kB 48.7kB 28 46
-
74 B 112 B 1 1
DNS Request
195.187.250.142.in-addr.arpa
-
72 B 169 B 1 1
DNS Request
68.204.58.216.in-addr.arpa
-
73 B 112 B 1 1
DNS Request
74.169.217.172.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
227.187.250.142.in-addr.arpa
-
65 B 105 B 1 1
DNS Request
clients2.google.com
DNS Response
142.250.179.238
-
204 B 3
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
74 B 113 B 1 1
DNS Request
238.179.250.142.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
16.234.44.23.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
147.166.122.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
66 B 112 B 1 1
DNS Request
beacons.gcp.gvt2.com
DNS Response
192.178.49.3
-
71 B 109 B 1 1
DNS Request
3.49.178.192.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
90.65.42.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371B
MD5d3f57b7bbd41c40beaa030c5a4537c0f
SHA1f3885734ca37b183f00287a34b242da10687dd5b
SHA25693b2bda2d956f48b7f0f2edee936e9792d6cff3ecca761994e0a59876bf2c8fe
SHA51245c84e9dad29a220aae2d2f9d28100a83154fdab1a474e29e132c11f525dffb4616838aea854a43dbe3b69dd54691218d8733539ee78403dcb53c81b3221721f
-
Filesize
6KB
MD5c0d5ca955b1bd60753d04d8a23103ac8
SHA12abcd72ea16a4a5303ef517c5d6cbe3e685fc16f
SHA25688bdbf21b98c0897cae72380c0abbb913316dae2ce68f76fed543b1b4f7f420c
SHA5124e356c252ea883f8b21e0a51056c31af2857735b77badb9029a9d2ff37f7094c73cc406c57e197dff2a22474914f900d4809ff49f1796e74f897e7c6bea355fd
-
Filesize
6KB
MD5fc0ec8b596b3526a6fc3bcaae35ac81d
SHA15ade519812edff67de8d2a97b43db0c0f3ab7d12
SHA256169a5e4aec30e3adb752ca1a0576fb3816fad5b54aab2bfd24b623bfbeb4cad8
SHA512b213b086dc157b35296a99d3c18d1e032bb73abaa4e4644831f1aa7efe404e1da7235dcfd13b81bfcbdce4e945c0cc8b62a1c6fa2138951bfe60bd22ce4e69a5
-
Filesize
15KB
MD5b89fa2a90521803f7790a7c5b38b182f
SHA172fd4ae79227a51b7b713a92933e3b32dc94b3c0
SHA256b55cc6d77cd0a2ae606f1aba3f76278524144a8725500dd55898fd5822f00f3d
SHA512361a2efb082d7c84e558483ca9d63a31fadd7744fbf64fae22e9bd6fc5ff53339aeefe3eba79277746b6595c8483b02520c8bc0f961b9442444309523afca8c5
-
Filesize
229KB
MD5440eb196a5ce03b7650e178c3bfb0fe4
SHA108e4fe5a7a8f1f6a5ae96b6608a24f7f18840daa
SHA2565ef77648ea846db408b5b7f3b4025cd1d42e06732f6981dc643cda6d80daa7c0
SHA5125113e2513b097544d397e1442afefffea85e490d7cb3f7615f950b46748af92f8741f46ff5acd70be12d699612807bdc0d0cdf2faea19606a97f05415ce8f0d4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd