Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/03/2025, 12:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Ransom.exe
Resource
win7-20240903-en
General
-
Target
Trojan.Ransom.exe
-
Size
431KB
-
MD5
fbbdc39af1139aebba4da004475e8839
-
SHA1
de5c8d858e6e41da715dca1c019df0bfb92d32c0
-
SHA256
630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da
-
SHA512
74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87
-
SSDEEP
12288:BHNTywFAvN86pLbqWRKHZKfErrZJyZ0yqsGO3XR63:vT56NbqWRwZaEr3yt2O3XR63
Malware Config
Signatures
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x000e00000001226d-20.dat mimikatz -
Executes dropped EXE 1 IoCs
pid Process 2180 F335.tmp -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 127 raw.githubusercontent.com 128 raw.githubusercontent.com -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\infpub.dat Trojan.Ransom.exe File opened for modification C:\Windows\infpub.dat rundll32.exe File created C:\Windows\cscc.dat rundll32.exe File created C:\Windows\dispci.exe rundll32.exe File opened for modification C:\Windows\F335.tmp rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trojan.Ransom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe 2784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2236 rundll32.exe 2236 rundll32.exe 2180 F335.tmp 2180 F335.tmp 2180 F335.tmp 2180 F335.tmp 2180 F335.tmp 2916 chrome.exe 2916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 2236 rundll32.exe Token: SeDebugPrivilege 2236 rundll32.exe Token: SeTcbPrivilege 2236 rundll32.exe Token: SeDebugPrivilege 2180 F335.tmp Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 1160 wrote to memory of 2236 1160 Trojan.Ransom.exe 32 PID 2236 wrote to memory of 2732 2236 rundll32.exe 33 PID 2236 wrote to memory of 2732 2236 rundll32.exe 33 PID 2236 wrote to memory of 2732 2236 rundll32.exe 33 PID 2236 wrote to memory of 2732 2236 rundll32.exe 33 PID 2732 wrote to memory of 2636 2732 cmd.exe 35 PID 2732 wrote to memory of 2636 2732 cmd.exe 35 PID 2732 wrote to memory of 2636 2732 cmd.exe 35 PID 2732 wrote to memory of 2636 2732 cmd.exe 35 PID 2236 wrote to memory of 2648 2236 rundll32.exe 36 PID 2236 wrote to memory of 2648 2236 rundll32.exe 36 PID 2236 wrote to memory of 2648 2236 rundll32.exe 36 PID 2236 wrote to memory of 2648 2236 rundll32.exe 36 PID 2648 wrote to memory of 2800 2648 cmd.exe 38 PID 2648 wrote to memory of 2800 2648 cmd.exe 38 PID 2648 wrote to memory of 2800 2648 cmd.exe 38 PID 2648 wrote to memory of 2800 2648 cmd.exe 38 PID 2236 wrote to memory of 2824 2236 rundll32.exe 39 PID 2236 wrote to memory of 2824 2236 rundll32.exe 39 PID 2236 wrote to memory of 2824 2236 rundll32.exe 39 PID 2236 wrote to memory of 2824 2236 rundll32.exe 39 PID 2236 wrote to memory of 2180 2236 rundll32.exe 41 PID 2236 wrote to memory of 2180 2236 rundll32.exe 41 PID 2236 wrote to memory of 2180 2236 rundll32.exe 41 PID 2236 wrote to memory of 2180 2236 rundll32.exe 41 PID 2824 wrote to memory of 2784 2824 cmd.exe 43 PID 2824 wrote to memory of 2784 2824 cmd.exe 43 PID 2824 wrote to memory of 2784 2824 cmd.exe 43 PID 2824 wrote to memory of 2784 2824 cmd.exe 43 PID 2916 wrote to memory of 2912 2916 chrome.exe 48 PID 2916 wrote to memory of 2912 2916 chrome.exe 48 PID 2916 wrote to memory of 2912 2916 chrome.exe 48 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50 PID 2916 wrote to memory of 840 2916 chrome.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan.Ransom.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.Ransom.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 152⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Delete /F /TN rhaegal3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /F /TN rhaegal4⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1456671091 && exit"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1456671091 && exit"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 12:58:003⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 12:58:004⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\F335.tmp"C:\Windows\F335.tmp" \\.\pipe\{BC9F04BE-79B4-4D5C-B1EC-C685410E7524}3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5c99758,0x7fef5c99768,0x7fef5c997782⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:22⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1644 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1588 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1156 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:22⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2948 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3408 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3620 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4016 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3768 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:12⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2440 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3184 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1580 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3952 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4124 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4216 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4248 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4284 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4240 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1384,i,11592102702417474239,17015282088542746908,131072 /prefetch:82⤵PID:2192
-
-
C:\Users\Admin\Downloads\$uckyLocker.exe"C:\Users\Admin\Downloads\$uckyLocker.exe"2⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2976
Network
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.200.4
-
Remote address:142.250.200.4:443RequestGET /async/ddljson?async=ntp:2 HTTP/2.0
host: www.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:142.250.200.4:443RequestGET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
host: www.google.com
x-client-data: COLsygE=
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestogads-pa.googleapis.comIN AResponseogads-pa.googleapis.comIN A142.250.180.10ogads-pa.googleapis.comIN A172.217.16.234ogads-pa.googleapis.comIN A142.250.187.234ogads-pa.googleapis.comIN A142.250.178.10ogads-pa.googleapis.comIN A216.58.212.202ogads-pa.googleapis.comIN A216.58.201.106ogads-pa.googleapis.comIN A216.58.212.234ogads-pa.googleapis.comIN A142.250.200.42ogads-pa.googleapis.comIN A142.250.187.202ogads-pa.googleapis.comIN A142.250.200.10ogads-pa.googleapis.comIN A172.217.169.42ogads-pa.googleapis.comIN A216.58.204.74ogads-pa.googleapis.comIN A142.250.179.234
-
Remote address:8.8.8.8:53Requestapis.google.comIN AResponseapis.google.comIN CNAMEplus.l.google.complus.l.google.comIN A142.250.200.14
-
OPTIONShttps://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncDatachrome.exeRemote address:142.250.180.10:443RequestOPTIONS /$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncData HTTP/2.0
host: ogads-pa.googleapis.com
accept: */*
access-control-request-method: POST
access-control-request-headers: content-type,x-goog-api-key,x-user-agent
origin: chrome-untrusted://new-tab-page
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-fetch-mode: cors
sec-fetch-site: cross-site
sec-fetch-dest: empty
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
GEThttps://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=protochrome.exeRemote address:142.250.180.10:443RequestGET /v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=proto HTTP/2.0
host: content-autofill.googleapis.com
x-goog-encode-response-if-executable: base64
x-goog-api-key: AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
x-client-data: COLsygE=
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
GEThttps://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.24R2mrw_td8.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo9vR1rNwOjC3PXOxUlyKiCwNBv2Fg/cb=gapi.loaded_0chrome.exeRemote address:142.250.200.14:443RequestGET /_/scs/abc-static/_/js/k=gapi.gapi.en.24R2mrw_td8.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo9vR1rNwOjC3PXOxUlyKiCwNBv2Fg/cb=gapi.loaded_0 HTTP/2.0
host: apis.google.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-ch-ua-platform: "Windows"
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestplay.google.comIN AResponseplay.google.comIN A142.250.187.206
-
Remote address:142.250.187.206:443RequestOPTIONS /log?format=json&hasfast=true HTTP/2.0
host: play.google.com
accept: */*
access-control-request-method: POST
access-control-request-headers: content-encoding,content-type
origin: chrome-untrusted://new-tab-page
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-fetch-mode: cors
sec-fetch-site: cross-site
sec-fetch-dest: empty
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestogs.google.comIN AResponseogs.google.comIN CNAMEwww3.l.google.comwww3.l.google.comIN A216.58.201.110
-
GEThttps://ogs.google.com/widget/app/so?eom=1&awwd=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=enchrome.exeRemote address:216.58.201.110:443RequestGET /widget/app/so?eom=1&awwd=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en HTTP/2.0
host: ogs.google.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
sec-ch-ua-platform: "Windows"
upgrade-insecure-requests: 1
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site: cross-site
sec-fetch-mode: navigate
sec-fetch-dest: iframe
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
cookie: __Secure-ENID=26.SE=f3q9g2qtVP5iOkLxB9SeHHWXz0H4Jv8RLPdSIxx_WnYfwmO9sHZdieTaMMstcS_mUiDDAVPRiB96zhO-YUmIwknShm5bDXMsWDV9NT33Xxxul_3aGzhe7Sx9_yN7w0VZqMuOpoFWyzXrbYQKG3U9DJCy_APqgHS8JehUYZRPrGBN5eIms5nq4Z6KPsquJbFdW3cu
-
Remote address:8.8.8.8:53Requestssl.gstatic.comIN AResponsessl.gstatic.comIN A172.217.16.227
-
Remote address:172.217.16.227:443RequestGET /gb/images/sprites/p_2x_72023649b67c.png HTTP/2.0
host: ssl.gstatic.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-ch-ua-platform: "Windows"
accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
referer: https://ogs.google.com/
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestconsent.google.comIN AResponseconsent.google.comIN A142.250.179.238
-
Remote address:8.8.8.8:53Requestcontent-autofill.googleapis.comIN AResponsecontent-autofill.googleapis.comIN A216.58.204.74content-autofill.googleapis.comIN A172.217.169.42content-autofill.googleapis.comIN A142.250.187.234content-autofill.googleapis.comIN A216.58.212.202content-autofill.googleapis.comIN A142.250.180.10content-autofill.googleapis.comIN A142.250.179.234content-autofill.googleapis.comIN A142.250.200.10content-autofill.googleapis.comIN A172.217.16.234content-autofill.googleapis.comIN A216.58.213.10content-autofill.googleapis.comIN A142.250.200.42content-autofill.googleapis.comIN A216.58.212.234content-autofill.googleapis.comIN A142.250.187.202content-autofill.googleapis.comIN A142.250.178.10content-autofill.googleapis.comIN A216.58.201.106
-
Remote address:8.8.8.8:53Requestgithub.comIN AResponsegithub.comIN A20.26.156.215
-
Remote address:8.8.8.8:53Requestgithub.githubassets.comIN AResponsegithub.githubassets.comIN A185.199.108.154github.githubassets.comIN A185.199.109.154github.githubassets.comIN A185.199.111.154github.githubassets.comIN A185.199.110.154
-
Remote address:8.8.8.8:53Requestavatars.githubusercontent.comIN AResponseavatars.githubusercontent.comIN A185.199.111.133avatars.githubusercontent.comIN A185.199.109.133avatars.githubusercontent.comIN A185.199.110.133avatars.githubusercontent.comIN A185.199.108.133
-
Remote address:8.8.8.8:53Requestgithub-cloud.s3.amazonaws.comIN AResponsegithub-cloud.s3.amazonaws.comIN CNAMEs3-1-w.amazonaws.coms3-1-w.amazonaws.comIN CNAMEs3-w.us-east-1.amazonaws.coms3-w.us-east-1.amazonaws.comIN A3.5.25.52s3-w.us-east-1.amazonaws.comIN A3.5.27.198s3-w.us-east-1.amazonaws.comIN A52.217.233.121s3-w.us-east-1.amazonaws.comIN A3.5.21.138s3-w.us-east-1.amazonaws.comIN A3.5.13.144s3-w.us-east-1.amazonaws.comIN A52.217.137.201s3-w.us-east-1.amazonaws.comIN A54.231.131.241s3-w.us-east-1.amazonaws.comIN A54.231.164.9
-
Remote address:8.8.8.8:53Requestuser-images.githubusercontent.comIN AResponseuser-images.githubusercontent.comIN A185.199.109.133user-images.githubusercontent.comIN A185.199.108.133user-images.githubusercontent.comIN A185.199.111.133user-images.githubusercontent.comIN A185.199.110.133
-
Remote address:8.8.8.8:53Requestcollector.github.comIN AResponsecollector.github.comIN CNAMEglb-db52c2cf8be544.github.comglb-db52c2cf8be544.github.comIN A140.82.114.22
-
Remote address:8.8.8.8:53Requestapi.github.comIN AResponseapi.github.comIN A20.26.156.210
-
Remote address:8.8.8.8:53Requestraw.githubusercontent.comIN AResponseraw.githubusercontent.comIN A185.199.108.133raw.githubusercontent.comIN A185.199.109.133raw.githubusercontent.comIN A185.199.111.133raw.githubusercontent.comIN A185.199.110.133
-
-
-
52 B 1
-
52 B 1
-
-
-
-
-
-
-
-
-
-
-
-
142.250.200.4:443https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0tls, http2chrome.exe2.5kB 44.5kB 32 45
HTTP Request
GET https://www.google.com/async/ddljson?async=ntp:2HTTP Request
GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0 -
142.250.180.10:443https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=prototls, http2chrome.exe2.4kB 7.4kB 20 22
HTTP Request
OPTIONS https://ogads-pa.googleapis.com/$rpc/google.internal.onegoogle.asyncdata.v1.AsyncDataService/GetAsyncDataHTTP Request
GET https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=proto -
142.250.200.14:443https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.24R2mrw_td8.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo9vR1rNwOjC3PXOxUlyKiCwNBv2Fg/cb=gapi.loaded_0tls, http2chrome.exe2.5kB 47.4kB 28 42
HTTP Request
GET https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.24R2mrw_td8.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo9vR1rNwOjC3PXOxUlyKiCwNBv2Fg/cb=gapi.loaded_0 -
1.7kB 8.2kB 13 14
HTTP Request
OPTIONS https://play.google.com/log?format=json&hasfast=true -
216.58.201.110:443https://ogs.google.com/widget/app/so?eom=1&awwd=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=entls, http2chrome.exe2.3kB 24.3kB 19 26
HTTP Request
GET https://ogs.google.com/widget/app/so?eom=1&awwd=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en -
172.217.16.227:443https://ssl.gstatic.com/gb/images/sprites/p_2x_72023649b67c.pngtls, http2chrome.exe4.7kB 171.5kB 77 131
HTTP Request
GET https://ssl.gstatic.com/gb/images/sprites/p_2x_72023649b67c.png -
-
-
-
2.3kB 9.9kB 15 17
-
3.5kB 65.4kB 40 58
-
1.1kB 4.0kB 11 8
-
885 B 6.2kB 8 8
-
79.5kB 3.2MB 1395 2437
-
989 B 6.3kB 9 11
-
885 B 6.2kB 8 8
-
885 B 6.2kB 8 8
-
989 B 6.3kB 9 11
-
989 B 6.4kB 9 11
-
28.3kB 1.4MB 559 1011
-
909 B 4.3kB 8 6
-
909 B 4.3kB 8 6
-
909 B 4.3kB 8 6
-
3.5kB 5.3kB 16 13
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
-
863 B 4.3kB 7 5
-
1.7kB 8.9kB 13 17
-
863 B 4.3kB 7 6
-
16.1kB 398.3kB 229 380
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
16.0kB 11.5kB 43 41
-
13.5kB 333.1kB 181 302
-
3.9kB 31.2kB 39 51
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 6
-
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
863 B 4.3kB 7 5
-
9.1kB 445.5kB 173 333
-
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 6
-
863 B 4.3kB 7 5
-
-
-
-
-
-
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.200.4
-
43.8kB 1.1MB 271 1001
-
69 B 277 B 1 1
DNS Request
ogads-pa.googleapis.com
DNS Response
142.250.180.10172.217.16.234142.250.187.234142.250.178.10216.58.212.202216.58.201.106216.58.212.234142.250.200.42142.250.187.202142.250.200.10172.217.169.42216.58.204.74142.250.179.234
-
61 B 98 B 1 1
DNS Request
apis.google.com
DNS Response
142.250.200.14
-
4.6kB 9.4kB 28 31
-
61 B 77 B 1 1
DNS Request
play.google.com
DNS Response
142.250.187.206
-
8.1kB 11.1kB 22 26
-
204 B 3
-
60 B 97 B 1 1
DNS Request
ogs.google.com
DNS Response
216.58.201.110
-
61 B 77 B 1 1
DNS Request
ssl.gstatic.com
DNS Response
172.217.16.227
-
4.1kB 8.5kB 12 14
-
64 B 80 B 1 1
DNS Request
consent.google.com
DNS Response
142.250.179.238
-
77 B 301 B 1 1
DNS Request
content-autofill.googleapis.com
DNS Response
216.58.204.74172.217.169.42142.250.187.234216.58.212.202142.250.180.10142.250.179.234142.250.200.10172.217.16.234216.58.213.10142.250.200.42216.58.212.234142.250.187.202142.250.178.10216.58.201.106
-
56 B 72 B 1 1
DNS Request
github.com
DNS Response
20.26.156.215
-
69 B 133 B 1 1
DNS Request
github.githubassets.com
DNS Response
185.199.108.154185.199.109.154185.199.111.154185.199.110.154
-
75 B 139 B 1 1
DNS Request
avatars.githubusercontent.com
DNS Response
185.199.111.133185.199.109.133185.199.110.133185.199.108.133
-
75 B 253 B 1 1
DNS Request
github-cloud.s3.amazonaws.com
DNS Response
3.5.25.523.5.27.19852.217.233.1213.5.21.1383.5.13.14452.217.137.20154.231.131.24154.231.164.9
-
79 B 143 B 1 1
DNS Request
user-images.githubusercontent.com
DNS Response
185.199.109.133185.199.108.133185.199.111.133185.199.110.133
-
66 B 115 B 1 1
DNS Request
collector.github.com
DNS Response
140.82.114.22
-
60 B 76 B 1 1
DNS Request
api.github.com
DNS Response
20.26.156.210
-
71 B 135 B 1 1
DNS Request
raw.githubusercontent.com
DNS Response
185.199.108.133185.199.109.133185.199.111.133185.199.110.133
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
353KB
MD5f866062e5e0bccfd8bdcaef0770820d5
SHA116e9d59445ecb04f99124d908f65f207f6cec7e3
SHA2562e4acdfb240251edc67b14ad039123f26c6b81ad16878f11fa3b4f1fd97abcf0
SHA5125d62cea848c474e0006e6126a0e0baa7a2625523196b15340e4b5e44fe45a19d702ac43cb2c1d47a0248ee6702e3a7b9053c2b06c782e98229e23e4cbdace541
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6f054eeb-fcfd-4f29-a40a-14ca2462b680.tmp
Filesize6KB
MD5154540f4a73ff2c4580c84bcddadfaf1
SHA1dfc3e2a45d92ec73e5110a1f2be2916a60e9efd8
SHA2568a43ff2d336ca48f150aacf7fc2d2654b4afedfc5eeb753de1dbf2e848a497e0
SHA51240748f5f1facdb57ece8abf0dc2c6634494f9e67b7f05b9ef233bc9d7b25a13e29ef46874cf8fe3174a6dea11d0c285c09b6b3207c3fc814a67fb05cc462290e
-
Filesize
21KB
MD5eb5f2f8b27b3794eb0b9d7302f3ed208
SHA1ceb14ae185daed71ebd356c06f067ee90ca75a3a
SHA25616a56eb5759e2174470278fec544af28e58f93a2e895141c140eef9409efeb60
SHA5124c1441f9bc16c6c03df5c727c75e238d41aa24127904f86d18eb755564765eed86674de1d6d19406c2f9085454bbaa26c9b65f31973a364906878a9fa4688eb8
-
Filesize
37KB
MD59a0f2fed78beabcb1af818103e79eb49
SHA1e36dcc0472152bec227a1f5a81b5024ff3624452
SHA256bc3ea6c39f4b013cb279391c0adbbd540219cae079703926d37a82dab9046450
SHA512c4a96707d57cb474f45d669a52e31cc4f34e783b3600781c683c88d470cc6f6c3a5c5a399af33b8a193c57df87e797087fab9f6817048baec5a75e44ff835c6e
-
Filesize
38KB
MD5adf2df4a8072227a229a3f8cf81dc9df
SHA148b588df27e0a83fa3c56d97d68700170a58bd36
SHA2562fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c
SHA512d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca
-
Filesize
16KB
MD5dc491f2e34e1eb5974c0781d49b8cbaf
SHA1b73ca9b5f9c627d49da4ecbc3455192e4b305a3f
SHA256f956049f0d96d455a71003eba400cb94f7067bc52620cd05b81006ecfdd438d8
SHA5125c9bd0d5c93a05ca76eb727328a0fde40f2be7fe53b6b6c9eb260e8f20f92cfc831fd4b46f954d85baf151ae8aba1cdd6f76b0faf96217922cad844c905f3645
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5a4965263a84df041ac69d512b5d00398
SHA1bb4a99996e2117e8525fd519ed6c5a4f4a71ad94
SHA256faf88dbf3f3e55a7b2ab9312629927234dd862d4adffaecfa68221c69b7a75c9
SHA512cbab87889ba87cdeed267c7acff1da1533f796a9c39eb19abf2fda1d19034a7758397c2fcbb26ef2825480e94e5198870dde5bfb7ed0c334669fade6b57c0dcb
-
Filesize
1KB
MD5dfd8c4d25659cf7a9823c5135dd88242
SHA12b207e1fa32061b829915c41ede2e74547cc3e72
SHA2560aef6e62fbb04a7baa1b53ecf1c7f16fa108f6b890f983d0e1fbd2c27cf26cad
SHA5120b8d991a3a64756333fda8cff906efc402966183f56d70e87f507ac030b26a90ba7fda2f2a184260560e9a2aa320778a33440001e4767e20c9d0da7ef84b5e8b
-
Filesize
854B
MD51bc4b2dcd3cda26c3348890e993c8e62
SHA14a153e4263227e184e9a8d5e7b7f4bbe6e49d976
SHA25638d9551ae06c85dd76b4443bb8801a8c1111a1a8861881dbb1ef9b60aa913ffc
SHA5124d5f2608a08abe9b74cb1984d9a40e617b95787577729fb66aae6e1bd278bca365b5291bf2119ad7d2e848233965ae1538c9d68425affc6aeab8f33cd717f8fe
-
Filesize
527B
MD5dfdccac5ab53e34621dac53f57468575
SHA1b8c74a46ebe433e09865c56f63486f45bdb84369
SHA25608015ff46b3fe5bb84e50cbabb4a91c2a30c62d04a5d4c0c9fac3afd4a594e09
SHA512d99b2b3c8372a2da5675a89e8750191d11694946ebf4a609090e59b96ea840a38088d57584501bcd627b129e85cc002d25fa5736cd1320aaadf65d47ca97790e
-
Filesize
1017B
MD51114d9cfddde0d14de97ceb8a74d3d18
SHA1155a5fcb3d61820b2ce045e2a73fb460d5da0031
SHA256790622f9f69806fd0439b5eb75ae3561850ad2a8594329276889582a28e54c73
SHA512ed409306f6fdfea42de99a3dde09c4f9a1dac82dc36f944eb85bd16d0039e8b050f815fddc88ad426a098573049e2b647696d185ee77c04df8f9cca8bbde0adb
-
Filesize
5KB
MD51657cffe4f48b959a4bae858a34626a5
SHA1f464f3277081c9a8f428a67f207553666b571d0c
SHA2568bb577a3e32f34456b553225e93421b21d88f739c06c56ed56ff2b360fd4615e
SHA5125899dd1c6c41819c0d6eddb27dd91e802f84436596f96c2db4eea74ce6354bfa3a67e2202ac0b3c0a6f80f4ed87a967f492105316e10b59b5fe72c59c0989516
-
Filesize
6KB
MD5519f2fd7ec0d3c5d1df96e8df5461933
SHA1db3adb066de60f63e25fd8e790e8351b99cac951
SHA256407620c3054fbd78e90d1331e436be0527e54dffd5b161db8bb6eee887f6a449
SHA5122682c0a73713ffa4dbb01d9416d764d57001fb182e93b564df26e11b60d9029b02f2ed14b5f4a836cbb7ecef1cc4d98c9d1eb29d4470cbe9f7161eecf0dff5f4
-
Filesize
6KB
MD5c860fb498fb26ea7208cec2bf1f33fd3
SHA1e1b838ff8cb997e745f4203ca4d04b304336a23f
SHA256ec9e01ba9f1fadfdec1e51e9270d588c65fd47525ba95f90c264c38c090c8ba4
SHA51205315b55500ce0b91cd24f4337caf405ada97e25dd43aadd36c98909850084023c9fc115128a28f39a627b9d4b611edb1709c96c728eff78079540defb8204d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
170KB
MD58623712bb080214ed2fb272535735934
SHA13af70c11a69f93d3e4b3cb890b198bf9061c3ae5
SHA2561b8b2a153d6beb72044fe99ad461628da647e4999cae5c7e081a84dd6788acca
SHA51292a25d2b538d8bbc37a80ef6f51fbf9c48e28e5d5c426805e8b7a013c008c21014f9d51cc460ca68f09869fbdc0b73bb8aa72b7130dbb669c9a587c94a780263
-
Filesize
412KB
MD55fa4c8f96974402f72c15211989649fd
SHA155b19eef3ecc8a0ebe81e78aa4a135abfbbd47b7
SHA2560cef897dd991d13e803c329b19e6169917485c9cda3d0f79de813743a7ec03da
SHA512079d30c219e1bfacdab0d4b6aa44e5b5570285af2893d201b928b085b05b74f2db6fdece0009c7df93e44063153f245e58a5d1a5a5e16cf70cbd7ec406fbaf4d
-
Filesize
75KB
MD5bd388b7e70ce7f3481f2df30b4833619
SHA1d48d63e6e1168fcb88ce6923f6ee286a2774d1ba
SHA25689fe8efc72c4e0e2e416386611f638a7f8ea5d828ad7008653aa7e3eee580052
SHA512e515175d3d4d4bd7881b7d60e5f4412766a4d708b075b4fe6a168beef69bc9f8bd00893f8295f9d16e42f785374f6f39cb6f35551152dfbf8bedc050872d19b1
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
414KB
MD5c850f942ccf6e45230169cc4bd9eb5c8
SHA151c647e2b150e781bd1910cac4061a2cee1daf89
SHA25686e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f
SHA5122b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9
-
Filesize
60KB
MD5347ac3b6b791054de3e5720a7144a977
SHA1413eba3973a15c1a6429d9f170f3e8287f98c21c
SHA256301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c
SHA5129a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787
-
Filesize
401KB
MD51d724f95c61f1055f0d02c2154bbccd3
SHA179116fe99f2b421c52ef64097f0f39b815b20907
SHA256579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648
SHA512f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113