General Info Watch the FULL Interactive Analysis at ANY.RUN!

URL

http://teamnutritiongenius.com

Verdict
Malicious activity
Analysis date
2/10/2019, 15:20:57
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

No suspicious indicators.

Reads settings of System Certificates
  • chrome.exe (PID: 2708)
Application launched itself
  • chrome.exe (PID: 2708)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
37
Monitored processes
9
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2708
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" http://teamnutritiongenius.com
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\samcli.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\hid.dll
c:\windows\system32\propsys.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\credui.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\d3d11.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\winusb.dll
c:\windows\system32\msi.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\mscms.dll
c:\windows\system32\wlanapi.dll
c:\windows\system32\wlanutil.dll
c:\windows\system32\audioses.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\wpc.dll
c:\windows\system32\samlib.dll
c:\windows\system32\firewallapi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\winsta.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\kbdus.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\wship6.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\wshqos.dll
c:\windows\system32\imagehlp.dll

PID
3468
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x6f7700b0,0x6f7700c0,0x6f7700cc
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll

PID
2820
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2712 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ole32.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_watcher.dll

PID
4012
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=956,1112433181398300262,13346142530850764726,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=33FF2C0AC3CCF2B4F5A9F9DE1C426F58 --mojo-platform-channel-handle=992 --ignored=" --type=renderer " /prefetch:2
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_child.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mf.dll
c:\windows\system32\atl.dll
c:\windows\system32\mfplat.dll
c:\windows\system32\avrt.dll
c:\windows\system32\ksuser.dll
c:\windows\system32\msmpeg2vdec.dll
c:\windows\system32\evr.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\slc.dll
c:\windows\system32\sqmapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\dxva2.dll
c:\program files\google\chrome\application\68.0.3440.106\d3dcompiler_47.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\program files\google\chrome\application\68.0.3440.106\swiftshader\libglesv2.dll
c:\program files\google\chrome\application\68.0.3440.106\swiftshader\libegl.dll

PID
2756
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,1112433181398300262,13346142530850764726,131072 --enable-features=PasswordImport --service-pipe-token=9FA4BEFECCF0649080EA9ECA35DF4D97 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9FA4BEFECCF0649080EA9ECA35DF4D97 --renderer-client-id=4 --mojo-platform-channel-handle=1908 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_child.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
3100
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,1112433181398300262,13346142530850764726,131072 --enable-features=PasswordImport --service-pipe-token=8FC767577AF1E7C24CB24E9688133455 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8FC767577AF1E7C24CB24E9688133455 --renderer-client-id=3 --mojo-platform-channel-handle=1536 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_child.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
3272
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=956,1112433181398300262,13346142530850764726,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=702CA2326CF2B3F79178EB13238ADAAB --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=702CA2326CF2B3F79178EB13238ADAAB --renderer-client-id=5 --mojo-platform-channel-handle=3828 /prefetch:1
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
LOW
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_child.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll

PID
2572
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=956,1112433181398300262,13346142530850764726,131072 --enable-features=PasswordImport --disable-gpu-sandbox --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=A2660C6CBBD6E67A8CE1B1D5B0384B73 --mojo-platform-channel-handle=4280 /prefetch:2
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_child.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\mf.dll
c:\windows\system32\atl.dll
c:\windows\system32\mfplat.dll
c:\windows\system32\avrt.dll
c:\windows\system32\ksuser.dll
c:\windows\system32\msmpeg2vdec.dll
c:\windows\system32\evr.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\slc.dll
c:\windows\system32\sqmapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\dxva2.dll
c:\program files\google\chrome\application\68.0.3440.106\d3dcompiler_47.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\program files\google\chrome\application\68.0.3440.106\swiftshader\libglesv2.dll
c:\program files\google\chrome\application\68.0.3440.106\swiftshader\libegl.dll

PID
2296
CMD
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=956,1112433181398300262,13346142530850764726,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=82FA702C3F347F8C50A6AB29EEDB37BE --mojo-platform-channel-handle=2420 /prefetch:8
Path
C:\Program Files\Google\Chrome\Application\chrome.exe
Indicators
No indicators
Parent process
chrome.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Google Inc.
Description
Google Chrome
Version
68.0.3440.106
Modules
Image
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winmm.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_child.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msdmo.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dwrite.dll
c:\windows\system32\winspool.drv
c:\windows\system32\dbghelp.dll
c:\windows\system32\dxgi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\twext.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\zipfldr.dll
c:\program files\winrar\rarext.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\syncui.dll
c:\windows\system32\synceng.dll
c:\program files\notepad++\nppshell_06.dll
c:\windows\system32\acppage.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\msi.dll
c:\windows\system32\wer.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\netutils.dll

Registry activity

Total events
495
Read events
452
Write events
42
Delete events
1

Modification events

PID
Process
Operation
Key
Name
Value
2708
chrome.exe
delete key
HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
failed_count
0
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
2
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
1
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
1
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome
UsageStatsInSample
0
2708
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
usagestats
0
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid_installdate
0
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
metricsid_enableddate
0
2708
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumAccounts
aggregate
sum()
2708
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumAccounts
S-1-5-21-1302019708-1500728564-335382590-1000
1
2708
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumSignedIn
aggregate
sum()
2708
chrome.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_NumSignedIn
S-1-5-21-1302019708-1500728564-335382590-1000
0
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
0
2708
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
13194282085503750
2708
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
2820
chrome.exe
write
HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
2708-13194282083363125
259
2296
chrome.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US

Files activity

Executable files
0
Suspicious files
27
Text files
68
Unknown types
6

Dropped files

PID Process Filename Type
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF1a5555.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001c image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\8c8cd57e-67b6-405d-b328-074d8a6ad8d8.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF1a2e54.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\7b5a29b4-25f3-44e3-9d59-6b12c738c6c7.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF19f795.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\3e3c17b2-721e-40a5-b12c-07a9e36e3bf7.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000037 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\TransportSecurity~RF19b915.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\d9555846-939d-4fc7-8cc4-c86c5f64a2f5.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RF19b8a7.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\c2442b75-83a1-40c7-b17b-fd7aa520332e.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State~RF19b82a.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\2c1d498c-52e3-48f9-90d3-8dad9f3c4202.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000036 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000035 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000034 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000033 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000032 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000031 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000030 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00002f compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00002e compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00002d image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00002c image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00002b image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00002a image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000029 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000028 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000027 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000026 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000025 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000024 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000023 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000022 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000021 image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000020 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old~RF19a1f3.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001f image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001e compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001d image
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Local State text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001b compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00001a compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000019 woff2
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000018 woff2
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000017 woff2
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000016 woff2
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000015 woff2
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000014 woff2
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Session binary
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000013 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000012 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.old~RF199ab0.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000011 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000010 compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000f compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\pkedcjkdefgpdelpbcmbmeomcjbeemfm\LOG.old~RF199706.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000e compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000d compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF199689.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\f_00000c compressed
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Translate Ranker Model binary
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Translate Ranker Model~RF199541.TMP binary
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\6432cc13-7b73-4ae4-a390-659182497f03.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Thumbnails\LOG.old~RF1992d0.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Thumbnails\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RF199272.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\CURRENT text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\CURRENT~RF199263.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\17bc742d-4b1a-414b-b45e-bd4121cf4493.tmp ––
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old~RF199205.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF199205.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\LOG.old~RF1991c6.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF1991c6.TMP text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version text
2708 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat binary
3468 chrome.exe C:\Users\admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pma binary

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
109
TCP/UDP connections
57
DNS requests
40
Threats
0

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/ US
html
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/mailchimp//css/flick/flick.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/?mcsf_action=main_css&ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/modules/theme-tools/compat/twentysixteen.css?ver=5.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/css/dist/block-library/style.min.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/css/dist/block-library/theme.min.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 2.23.75.124:80 http://platform-api.sharethis.com/js/sharethis.js unknown
text
unknown
2708 chrome.exe GET 200 172.217.22.42:80 http://fonts.googleapis.com/css?family=Shadows+Into+Light%3Aregular&subset=latin%2Call&ver=5.0.3 US
text
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/click-to-tweet-by-todaymade/assets/css/styles.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jquery-pin-it-button-for-images/css/client.css?ver=2.3.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/_inc/genericons/genericons/genericons.css?ver=3.1 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/themes/twentysixteen/style.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/themes/twentysixteen/css/blocks.css?ver=20181230 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/advanced-wp-columns/assets/css/awp-columns.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=1 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/css/jetpack.css?ver=5.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/ziplist-recipe-plugin/zlrecipe-std.css US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/easy-columns/css/easy-columns.css US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/jquery/jquery.js?ver=1.12.4 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/mailchimp//js/scrollTo.js?ver=1.5.7 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/jquery/jquery.form.min.js?ver=4.2.1 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/mailchimp//js/mailchimp.js?ver=1.5.7 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/mailchimp//js/datepicker.js?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 35.165.225.32:80 http://load.sumome.com/ US
text
unknown
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/mediaelement/mediaelementplayer-legacy.min.css?ver=4.2.6-78496d1 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/mediaelement/wp-mediaelement.min.css?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 503 13.32.222.195:80 http://www.zlcdn.com/stylesheets/minibox/generic.css US
––
––
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jquery-pin-it-button-for-images/js/jpibfi.client.js?ver=2.3.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/modules/wpgroho.js?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/themes/twentysixteen/js/skip-link-focus-fix.js?ver=20160816 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/themes/twentysixteen/js/functions.js?ver=20181230 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/wp-embed.min.js?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 192.0.73.2:80 http://s.gravatar.com/js/gprofiles.js?ver=2019Febaa US
text
whitelisted
2708 chrome.exe GET 200 192.0.73.2:80 http://1.gravatar.com/avatar/a7b23086e9d794871a0220c0f31981c6?s=49&d=mm&r=g US
image
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/powerpress/player.min.js?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/mediaelement/mediaelement-and-player.min.js?ver=4.2.6-78496d1 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/mediaelement/mediaelement-migrate.min.js?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/mediaelement/wp-mediaelement.min.js?ver=5.0.3 US
html
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/modules/sharedaddy/sharing.js?ver=5.3 US
text
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/ziplist-recipe-plugin/zlrecipe_print.js US
html
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/05/87-management.png US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/04/86-positive-psychology.png US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/04/christyadkins-768x768.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/03/84-lily-nichols-1.png US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/02/ashleylogoNGR-768x783.png US
image
malicious
2708 chrome.exe GET 200 192.0.73.2:80 http://s.gravatar.com/dist/css/hovercard.min.css?ver=2019Febaa US
text
whitelisted
2708 chrome.exe GET 200 192.0.73.2:80 http://s.gravatar.com/dist/css/services.min.css?ver=2019Febaa US
text
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/powerpress/images/spriteStandard.png US
image
malicious
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F05%2F87-rebecca-behr-rdn%2F&_=1549808487556 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F04%2F86-positive-psychology-with-amy-osullivan%2F&_=1549808487557 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F03%2F84-lily-nichols-rdn-cde-clt%2F&_=1549808487559 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F04%2F85-christy-adkins%2F&_=1549808487558 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F03%2F83-ashley-reaver-ms-rd-cssd%2F&_=1549808487560 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F02%2F82-monica-salafia-ms-rd-cpt%2F&_=1549808487561 US
text
whitelisted
2708 chrome.exe POST 200 166.62.115.254:80 http://teamnutritiongenius.com/?ga_action=googleanalytics_get_script US
text
text
malicious
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.7841310888288482 US
image
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2018%2F01%2F81-ketogenic-diet%2F&_=1549808487562 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2017%2F11%2F79-holiday-how-tos%2F&_=1549808487564 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2017%2F12%2F80-who-to-trust-orthorexia%2F&_=1549808487563 US
text
whitelisted
2708 chrome.exe GET 200 157.240.1.18:80 http://graph.facebook.com/?callback=WPCOMSharing.update_facebook_count&ids=http%3A%2F%2Fteamnutritiongenius.com%2F2017%2F10%2F78-back-for-realzzz-part-2%2F&_=1549808487565 US
text
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/wp-emoji-release.min.js?ver=5.0.3 US
text
malicious
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.33800058987491166 US
image
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/02/82-monica-salafia.png US
image
malicious
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.12661759427743724 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.2928690607358597 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.9530083093273474 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.3375369986281853 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.4317351430882397 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.8843520255218795 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.31099639665292966 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=wpcom-no-pv&x_sharing-count-request=facebook&r=0.6575004878120942 US
image
whitelisted
2708 chrome.exe GET 200 192.0.76.3:80 http://pixel.wp.com/g.gif?v=ext&j=1%3A5.3&blog=75911886&post=0&tz=-5&srv=teamnutritiongenius.com&host=teamnutritiongenius.com&ref=&rand=0.8668252840837476 US
image
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/01/81-ketogenic.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/01/hurts-my-face-768x766.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2017/12/Episode-80-717x1024.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2017/11/IMG_4161-768x512.jpg US
text
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2017/10/EP78-768x1024.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/jetpack/modules/sharedaddy/images/loading.gif US
text
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/04/christyadkins-1024x1024.jpg US
text
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2018/02/ashleylogoNGR-1005x1024.png US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2017/12/Episode-80-1200x1714.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2017/11/IMG_4161-1024x683.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/uploads/2017/10/EP78-1200x1600.jpg US
image
malicious
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-content/plugins/click-to-tweet-by-todaymade/assets/img/twitter-little-bird.png US
text
image
malicious
2708 chrome.exe POST 200 54.148.199.253:80 http://sumo.com/api/load/ US
text
text
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/wp-includes/js/mediaelement/mejs-controls.svg US
text
image
malicious
2708 chrome.exe OPTIONS 204 54.148.199.253:80 http://sumo.com/services US
text
text
whitelisted
2708 chrome.exe POST 200 54.148.199.253:80 http://sumo.com/services US
text
html
whitelisted
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/549559479456f3bd3dc10df57c3ca747091157fb/client/js/smart-bar/service.js DE
text
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/030f6b636990758048f7ee2f856614c1e1f970e5/client/js/listbuilder-legacy/service.js DE
text
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/5717d4fcfe48308248a86a037e0f77eca7af491d/client/js/services/index.js DE
text
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/3015c7a8d0b126273053ccb2490ada7613439fae/client/css/sumome-smartbar-popup.css DE
text
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/d563d0fc56024676a28c31265f7c67c9d23a7808/client/css/sme-popup.css DE
text
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/84ab0004c0bc94ccb5fd63cf162b857c70a7e562/client/css/sumome-image-sharer.css DE
text
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/virtual/f9601844b2965d750bb765a2a3f2d61938a7033e/client/css/sumome-share-client.css DE
text
malicious
2708 chrome.exe GET 200 54.148.199.253:80 http://sumo.com/api/event/?site_id=c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b710&app_id=408190b5-e369-48af-8e31-afb7380ecd66&shortcut_id=&visitor_id=ca516c88dd9d4370859d6b1b9fc82e04cff1151629ebd9d51610b68ac46a42b0&event=popup&href=http%3A%2F%2Fteamnutritiongenius.com%2F&ref=&cache=0.9082773569527485 US
text
whitelisted
2708 chrome.exe GET 200 54.148.199.253:80 http://sumo.com/api/event/?site_id=c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b710&app_id=408190b5-e369-48af-8e31-afb7380ecd66.c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b710&shortcut_id=&visitor_id=ca516c88dd9d4370859d6b1b9fc82e04cff1151629ebd9d51610b68ac46a42b0&event=popup&href=http%3A%2F%2Fteamnutritiongenius.com%2F&ref=&cache=0.9893312162101526 US
text
whitelisted
2708 chrome.exe GET 200 54.148.199.253:80 http://sumo.com/api/event/?site_id=c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b710&app_id=408190b5-e369-48af-8e31-afb7380ecd66.c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b711&shortcut_id=&visitor_id=ca516c88dd9d4370859d6b1b9fc82e04cff1151629ebd9d51610b68ac46a42b0&event=popup&href=http%3A%2F%2Fteamnutritiongenius.com%2F&ref=&cache=0.5781455622903862 US
text
whitelisted
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/static/31bc1e35d7e38dca634be26aa062b98934f439b2/client/images/apps/9e8a4d2a-6f8c-415e-851b-bdfe4c01d5c1/facebook-white-60.png DE
image
malicious
2708 chrome.exe GET 200 54.148.199.253:80 http://sumo.com/api/event/?site_id=c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b710&app_id=408190b5-e369-48af-8e31-afb7380ecd66.c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b710.c87fcefbb52268f00737b725d4c7617d4ff66d4e254f130cbc899c611c54b711&shortcut_id=&visitor_id=ca516c88dd9d4370859d6b1b9fc82e04cff1151629ebd9d51610b68ac46a42b0&event=popup&href=http%3A%2F%2Fteamnutritiongenius.com%2F&ref=&cache=0.3241566677877292 US
text
whitelisted
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/static/31bc1e35d7e38dca634be26aa062b98934f439b2/client/images/apps/9e8a4d2a-6f8c-415e-851b-bdfe4c01d5c1/pinterest-white-60.png DE
image
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/static/31bc1e35d7e38dca634be26aa062b98934f439b2/client/images/apps/9e8a4d2a-6f8c-415e-851b-bdfe4c01d5c1/twitter-white-60.png DE
image
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/static/31bc1e35d7e38dca634be26aa062b98934f439b2/client/images/apps/9e8a4d2a-6f8c-415e-851b-bdfe4c01d5c1/sumome-white-60.png DE
image
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/static/31bc1e35d7e38dca634be26aa062b98934f439b2/client/images/apps/9e8a4d2a-6f8c-415e-851b-bdfe4c01d5c1/googleplus-white-60.png DE
image
malicious
2708 chrome.exe GET 200 62.113.194.2:80 http://sumo.b-cdn.net/static/31bc1e35d7e38dca634be26aa062b98934f439b2/client/images/apps/9e8a4d2a-6f8c-415e-851b-bdfe4c01d5c1/email-white-60.png DE
image
malicious
2708 chrome.exe GET 200 54.148.199.253:80 http://sumo.com/client/images/apps/408190b5-e369-48af-8e31-afb7380ecd66/transparent-crown-light.png US
image
whitelisted
2708 chrome.exe GET 200 166.62.115.254:80 http://teamnutritiongenius.com/favicon.ico US
image
malicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2708 chrome.exe 216.58.208.35:443 Google Inc. US whitelisted
2708 chrome.exe 166.62.115.254:80 GoDaddy.com, LLC US unknown
2708 chrome.exe 216.58.206.3:443 Google Inc. US whitelisted
2708 chrome.exe 216.58.205.237:443 Google Inc. US whitelisted
2708 chrome.exe 172.217.22.42:80 Google Inc. US whitelisted
2708 chrome.exe 172.217.22.42:443 Google Inc. US whitelisted
2708 chrome.exe 64.233.167.139:443 Google Inc. US whitelisted
2708 chrome.exe 2.23.75.124:80 Akamai Technologies, Inc. –– unknown
2708 chrome.exe 35.165.225.32:80 Amazon.com, Inc. US unknown
2708 chrome.exe 172.217.22.3:80 Google Inc. US whitelisted
2708 chrome.exe 172.217.22.3:443 Google Inc. US whitelisted
2708 chrome.exe 13.32.222.195:80 Amazon.com, Inc. US unknown
2708 chrome.exe 2.16.186.243:443 Akamai International B.V. –– whitelisted
2708 chrome.exe 192.0.77.32:443 Automattic, Inc US unknown
2708 chrome.exe 192.0.73.2:80 Automattic, Inc US whitelisted
2708 chrome.exe 192.0.76.3:443 Automattic, Inc US unknown
2708 chrome.exe 157.240.1.18:80 Facebook, Inc. US whitelisted
2708 chrome.exe 192.0.76.3:80 Automattic, Inc US unknown
2708 chrome.exe 216.58.205.238:443 Google Inc. US whitelisted
2708 chrome.exe 18.185.192.244:443 US unknown
2708 chrome.exe 172.217.23.131:443 Google Inc. US whitelisted
2708 chrome.exe 172.217.16.196:443 Google Inc. US whitelisted
2708 chrome.exe 216.58.207.78:443 Google Inc. US whitelisted
2708 chrome.exe 54.148.199.253:80 Amazon.com, Inc. US unknown
2708 chrome.exe 62.113.194.2:80 23media GmbH DE malicious
2708 chrome.exe 18.195.194.147:443 Amazon.com, Inc. DE unknown

DNS requests

Domain IP Reputation
clientservices.googleapis.com 216.58.206.3
whitelisted
teamnutritiongenius.com 166.62.115.254
unknown
www.gstatic.com 216.58.208.35
whitelisted
accounts.google.com 216.58.205.237
whitelisted
apis.google.com 64.233.167.139
64.233.167.113
64.233.167.102
64.233.167.101
64.233.167.100
64.233.167.138
whitelisted
fonts.googleapis.com 172.217.22.42
whitelisted
platform-api.sharethis.com 2.23.75.124
unknown
load.sumome.com 35.165.225.32
52.38.84.169
unknown
fonts.gstatic.com 172.217.22.3
whitelisted
s.gravatar.com 192.0.73.2
whitelisted
s.w.org 192.0.77.48
whitelisted
s0.wp.com 192.0.77.32
whitelisted
www.zlcdn.com 13.32.222.195
13.32.222.142
13.32.222.178
13.32.222.176
whitelisted
pearlsofnutrition.com 72.167.241.134
unknown
itunes.apple.com 104.111.214.42
unknown
c.sharethis.mgr.consensu.org 2.16.186.243
2.16.186.146
malicious
media.blubrry.com 54.87.43.77
unknown
store.nols.edu 23.227.38.64
malicious
ppc.sas.upenn.edu 23.185.0.4
unknown
thesassydietitian.com 198.71.188.149
unknown
v0.wordpress.com 192.0.78.13
192.0.78.12
unknown
subscribeonandroid.com 54.164.160.104
whitelisted
www.amazon.com 13.32.154.60
whitelisted
www.instagram.com 185.60.216.174
whitelisted
www.nols.edu 208.89.161.140
unknown
www.corymuscara.com 96.30.4.106
unknown
www.keene.edu 50.19.103.154
unknown
www.viacharacter.org 206.72.117.118
unknown
www.stitcher.com 13.32.223.150
13.32.223.134
13.32.223.96
13.32.223.102
unknown
1.gravatar.com 192.0.73.2
whitelisted
stats.wp.com 192.0.76.3
whitelisted
graph.facebook.com 157.240.1.18
whitelisted
pixel.wp.com 192.0.76.3
whitelisted
clients1.google.com 216.58.205.238
whitelisted
l.sharethis.com 18.185.192.244
18.195.194.147
18.184.119.244
18.185.185.214
unknown
ssl.gstatic.com 172.217.23.131
whitelisted
google-analytics.com 172.217.16.196
whitelisted
www.google-analytics.com 216.58.207.78
whitelisted
sumo.com 54.148.199.253
54.200.150.117
whitelisted
sumo.b-cdn.net 62.113.194.2
malicious

Threats

No threats detected.

Debug output strings

No debug info.