Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
926s -
max time network
1084s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 10:53 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win7-20240708-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 388 chrome.exe 388 chrome.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2052 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeDebugPrivilege 2052 taskmgr.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeShutdownPrivilege 388 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 2348 388 chrome.exe 31 PID 388 wrote to memory of 2348 388 chrome.exe 31 PID 388 wrote to memory of 2348 388 chrome.exe 31 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2812 388 chrome.exe 33 PID 388 wrote to memory of 2968 388 chrome.exe 34 PID 388 wrote to memory of 2968 388 chrome.exe 34 PID 388 wrote to memory of 2968 388 chrome.exe 34 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35 PID 388 wrote to memory of 2956 388 chrome.exe 35
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef64f9758,0x7fef64f9768,0x7fef64f97782⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:22⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1468 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3184 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 --field-trial-handle=1304,i,3552562018223014686,639824922080563576,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2596
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2052
Network
-
Remote address:8.8.8.8:53Requestgoogle.comIN AResponsegoogle.comIN A142.250.75.238
-
Remote address:142.250.75.238:80RequestGET / HTTP/1.1
Host: google.com
Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgwIt46XtgYQpJDDtwESBMJuDUY
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-3XvxFuxmMX-EJQoHbWej5Q' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/other"}]}
Permissions-Policy: unload=()
Date: Wed, 21 Aug 2024 10:53:43 GMT
Server: gws
Content-Length: 392
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AVYB7cokdl8sAcj_XexJlB8NohJaE7832aGDZoE6-gR2Qz0UvEQScXBODYo; expires=Mon, 17-Feb-2025 10:53:43 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.179.68
-
GEThttps://www.google.com/sorry/index?continue=http://google.com/&q=EgTCbg1GGLaOl7YGIjAt-PhIUVBwPVAEDXCMM8MC1K0n222iGe563F98dUrnNJz5Qfivh1aS-AAXeCtiiXAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMchrome.exeRemote address:142.250.179.68:443RequestGET /sorry/index?continue=http://google.com/&q=EgTCbg1GGLaOl7YGIjAt-PhIUVBwPVAEDXCMM8MC1K0n222iGe563F98dUrnNJz5Qfivh1aS-AAXeCtiiXAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/2.0
host: www.google.com
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
sec-ch-ua-arch: "x86"
sec-ch-ua-platform-version: "0.1.0"
sec-ch-ua-model: ""
sec-ch-ua-bitness: "64"
sec-ch-ua-wow64: ?0
sec-ch-ua-full-version-list: "Chromium";v="106.0.5249.119", "Google Chrome";v="106.0.5249.119", "Not;A=Brand";v="99.0.0.0"
x-client-data: CO/xygE=
sec-fetch-site: none
sec-fetch-mode: navigate
sec-fetch-user: ?1
sec-fetch-dest: document
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestcontent-autofill.googleapis.comIN AResponsecontent-autofill.googleapis.comIN A142.250.75.234content-autofill.googleapis.comIN A142.250.74.234content-autofill.googleapis.comIN A142.250.178.138content-autofill.googleapis.comIN A172.217.20.202content-autofill.googleapis.comIN A142.250.179.106content-autofill.googleapis.comIN A216.58.214.74content-autofill.googleapis.comIN A142.250.179.74content-autofill.googleapis.comIN A142.250.201.170content-autofill.googleapis.comIN A172.217.20.170content-autofill.googleapis.comIN A216.58.214.170
-
GEThttps://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAk8dqZYMe7mkRIFDVNaR8U=?alt=protochrome.exeRemote address:142.250.75.234:443RequestGET /v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAk8dqZYMe7mkRIFDVNaR8U=?alt=proto HTTP/2.0
host: content-autofill.googleapis.com
x-goog-encode-response-if-executable: base64
x-goog-api-key: AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
x-client-data: CO/xygE=
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestbeacons.gcp.gvt2.comIN AResponsebeacons.gcp.gvt2.comIN CNAMEbeacons-handoff.gcp.gvt2.combeacons-handoff.gcp.gvt2.comIN A142.250.68.227
-
Remote address:142.250.68.227:443RequestPOST /domainreliability/upload HTTP/2.0
host: beacons.gcp.gvt2.com
content-length: 1088
content-type: application/json; charset=utf-8
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:142.250.68.227:443RequestPOST /domainreliability/upload HTTP/2.0
host: beacons.gcp.gvt2.com
content-length: 270
content-type: application/json; charset=utf-8
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:142.250.68.227:443RequestPOST /domainreliability/upload HTTP/2.0
host: beacons.gcp.gvt2.com
content-length: 639
content-type: application/json; charset=utf-8
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
976 B 2.0kB 12 11
HTTP Request
GET http://google.com/HTTP Response
302 -
282 B 196 B 6 4
-
142.250.179.68:443https://www.google.com/sorry/index?continue=http://google.com/&q=EgTCbg1GGLaOl7YGIjAt-PhIUVBwPVAEDXCMM8MC1K0n222iGe563F98dUrnNJz5Qfivh1aS-AAXeCtiiXAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMtls, http2chrome.exe2.6kB 9.8kB 23 25
HTTP Request
GET https://www.google.com/sorry/index?continue=http://google.com/&q=EgTCbg1GGLaOl7YGIjAt-PhIUVBwPVAEDXCMM8MC1K0n222iGe563F98dUrnNJz5Qfivh1aS-AAXeCtiiXAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM -
142.250.75.234:443https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAk8dqZYMe7mkRIFDVNaR8U=?alt=prototls, http2chrome.exe2.0kB 7.0kB 20 20
HTTP Request
GET https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAk8dqZYMe7mkRIFDVNaR8U=?alt=proto -
5.0kB 8.3kB 37 38
HTTP Request
POST https://beacons.gcp.gvt2.com/domainreliability/uploadHTTP Request
POST https://beacons.gcp.gvt2.com/domainreliability/uploadHTTP Request
POST https://beacons.gcp.gvt2.com/domainreliability/upload -
999 B 5.6kB 9 8
-
56 B 72 B 1 1
DNS Request
google.com
DNS Response
142.250.75.238
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.179.68
-
7.2kB 54.6kB 42 62
-
77 B 237 B 1 1
DNS Request
content-autofill.googleapis.com
DNS Response
142.250.75.234142.250.74.234142.250.178.138172.217.20.202142.250.179.106216.58.214.74142.250.179.74142.250.201.170172.217.20.170216.58.214.170
-
204 B 3
-
66 B 112 B 1 1
DNS Request
beacons.gcp.gvt2.com
DNS Response
142.250.68.227
-
2.0kB 7.7kB 8 10
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5b1f2b8e8c98a1089b5d354b7011a8a9e
SHA181e1f3c90ad18b3319a43c9ce37756e234335cee
SHA25603d25c84c9a2029ab9838e20cd417ee1fb59e1a2cb5d261df82bd035bad4450e
SHA5129af57b78c45bc8d9f7298d533921be9e3e8db789fa8ad60189f8e9ef9c9b17a85c0751d07315fdd6c8dbe9bc28e0ad6d267f4ae9cd86fac33a98d7f8bfa736ef
-
Filesize
1KB
MD5c5968a5df9186ce173d5d9d8d096873e
SHA1001b5aa7cd9b980d7725d2800bbe0b08fcfe6acd
SHA2560ef423574496af67880b27b353b9149a994120b6cc5f924b8558da4dfb5cf43b
SHA51222df7d4c81b00ee73ca4617a2b0a0854a49be91fdeaf494563e721327e61c968e566a34ea804727d593d882d0e4781c33264e81a519786fc82b8127b63015c29
-
Filesize
5KB
MD59b6bb545bed2f93352a3ef90d0e6ddbb
SHA1828f7b0c14e2737461527ddb2f5839dd040c9354
SHA256be8f66d04b47c3a689fd4426fd9d2c76a560d6022e53190044aed7a64288a753
SHA51216ed2eb22aa4c30d9dd6ac4eb3a7d562365c6f6fa40a1b01ee6e173eb7161425a1f23072279c46515c339ab65bec2079018671b53db99ecbb9628b9cf0cc52c7
-
Filesize
5KB
MD5922ebb7cf76f7172e5222c7836c19857
SHA166a4706dd91fe3ab95dbf9a9cf8ff15fe95c8d18
SHA2565ec6240d545ed52aa28b5f59822a6da49858f816f2445bab92d389467f6b9f40
SHA51291d0a8024dbafe908a267e68c2be7756bb735852c2c34bd68c45224a56904c99a661b8116747cf45f28463909f41e96ac29d733c4f281b7f2e1f913f5c24cfa9
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2