File name:

谷歌安装包_19.25.13.exe

Full analysis: https://app.any.run/tasks/d482301d-bc6d-4381-966a-a6273bb7bfab
Verdict: Malicious activity
Threats:

FatalRAT is a malware that gives hackers remote access and control of the system and lets them steal sensitive information like login credentials and financial data. FatalRAT has been associated with cyber espionage campaigns, particularly targeting organizations in the Asia-Pacific (APAC) region.

Analysis date: April 29, 2025, 14:12:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
fatalrat
rat
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

312774722B2A953142E3D39C464FA9DF

SHA1:

8F97BD42B627D1AAE74C775E78E05D85BD31B4AE

SHA256:

30F1434C85FCBFB70B8C294460EE2F7368F4FF1AEBFB85E06AAC5ED3D5046C47

SSDEEP:

786432:VCkdXcQjbQerCh1ies8DJsQ+4rjpGuZFOazORU:VCicQjbQACh1ie7DJsr4rjMuZFDzO+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • svchost.exe (PID: 684)
    • FATALRAT has been detected (SURICATA)

      • svchost.exe (PID: 684)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • 谷歌安装包_19.25.13.exe (PID: 4724)
    • ADVANCEDINSTALLER mutex has been found

      • 谷歌安装包_19.25.13.exe (PID: 4724)
    • Process drops legitimate windows executable

      • 谷歌安装包_19.25.13.exe (PID: 4724)
    • Executable content was dropped or overwritten

      • 谷歌安装包_19.25.13.exe (PID: 4724)
      • GoogleUpdateSetup.exe (PID: 6816)
      • 135.0.7049.115_chrome_installer.exe (PID: 2288)
      • setup.exe (PID: 2084)
      • setup.exe (PID: 4152)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5380)
      • TjNKNP.exe (PID: 5452)
    • Detects AdvancedInstaller (YARA)

      • 谷歌安装包_19.25.13.exe (PID: 4724)
      • msiexec.exe (PID: 6040)
    • There is functionality for taking screenshot (YARA)

      • 谷歌安装包_19.25.13.exe (PID: 4724)
    • Application launched itself

      • TjNKNP.exe (PID: 6560)
      • TjNKNP.exe (PID: 5680)
      • GoogleUpdate.exe (PID: 3300)
      • setup.exe (PID: 1852)
      • setup.exe (PID: 2084)
    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 684)
    • Connects to unusual port

      • svchost.exe (PID: 684)
    • Process requests binary or script from the Internet

      • svchost.exe (PID: 5048)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 5048)
  • INFO

    • Checks supported languages

      • 谷歌安装包_19.25.13.exe (PID: 4724)
      • msiexec.exe (PID: 6800)
      • msiexec.exe (PID: 6040)
    • Reads Environment values

      • 谷歌安装包_19.25.13.exe (PID: 4724)
    • Reads the computer name

      • msiexec.exe (PID: 6040)
      • 谷歌安装包_19.25.13.exe (PID: 4724)
      • msiexec.exe (PID: 6800)
    • The sample compiled with chinese language support

      • 谷歌安装包_19.25.13.exe (PID: 4724)
      • msiexec.exe (PID: 6040)
      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • Create files in a temporary directory

      • 谷歌安装包_19.25.13.exe (PID: 4724)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6040)
      • setup.exe (PID: 4152)
      • 谷歌安装包_19.25.13.exe (PID: 4724)
      • GoogleUpdateSetup.exe (PID: 6816)
      • setup.exe (PID: 2084)
      • 135.0.7049.115_chrome_installer.exe (PID: 2288)
    • Manages system restore points

      • SrTasks.exe (PID: 3304)
    • Manual execution by a user

      • TjNKNP.exe (PID: 6560)
      • TjNKNP.exe (PID: 5680)
      • setup.exe (PID: 4152)
    • The sample compiled with bulgarian language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6040)
    • The sample compiled with czech language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with spanish language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with Indonesian language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with french language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 6040)
    • The sample compiled with german language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with Italian language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with korean language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with portuguese language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with polish language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with russian language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with japanese language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with swedish language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with turkish language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • The sample compiled with arabic language support

      • GoogleUpdateSetup.exe (PID: 6816)
      • setup.exe (PID: 4152)
    • The sample compiled with slovak language support

      • setup.exe (PID: 4152)
      • GoogleUpdateSetup.exe (PID: 6816)
    • Executes as Windows Service

      • elevation_service.exe (PID: 2040)
    • Application launched itself

      • chrome.exe (PID: 6708)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:05:31 13:15:01+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.36
CodeSize: 2484736
InitializedDataSize: 945664
UninitializedDataSize: -
EntryPoint: 0x1d6f94
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: TargetCommandSwiftUI
FileDescription: Installation Database Installer
FileVersion: 1.0.0
InternalName: 转接口
LegalCopyright: Copyright (C) 2025 TargetCommandSwiftUI
OriginalFileName: 转接口.exe
ProductName: Installation Database
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
206
Monitored processes
77
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 谷歌安装包_19.25.13.exe msiexec.exe msiexec.exe no specs msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msi4d0d.tmp no specs tjnknp.exe no specs conhost.exe no specs tjnknp.exe conhost.exe no specs tjnknp.exe no specs conhost.exe no specs tjnknp.exe conhost.exe no specs tjnknp.exe no specs setup.exe no specs setup.exe googleupdate.exe no specs googleupdatesetup.exe googleupdate.exe no specs googleupdate.exe no specs googleupdate.exe googleupdate.exe #FATALRAT svchost.exe svchost.exe no specs svchost.exe no specs svchost.exe svchost.exe slui.exe 135.0.7049.115_chrome_installer.exe setup.exe setup.exe no specs setup.exe no specs setup.exe no specs googleupdate.exe googleupdateondemand.exe no specs googleupdate.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe elevation_service.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs 谷歌安装包_19.25.13.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Program Files (x86)\Google\Update\Install\{52590461-AC34-473F-88B6-86CA11481751}\CR_BC89C.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\WINDOWS\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=135.0.7049.115 --initial-client-data=0x290,0x294,0x298,0x26c,0x29c,0x7ff65bbb95f8,0x7ff65bbb9604,0x7ff65bbb9610C:\Program Files (x86)\Google\Update\Install\{52590461-AC34-473F-88B6-86CA11481751}\CR_BC89C.tmp\setup.exesetup.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Exit code:
0
Version:
135.0.7049.115
Modules
Images
c:\program files (x86)\google\update\install\{52590461-ac34-473f-88b6-86ca11481751}\cr_bc89c.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
496"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=1996,i,3888499534003619586,4328887081420140704,262144 --variations-seed-version --mojo-platform-channel-handle=5188 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.115
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
684"C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe
setup.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Modules
Images
c:\programdata\nvidiarv\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
856C:\Windows\syswow64\MsiExec.exe -Embedding DCB98D3C3D6C90C0852E4D9F5653CB25C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
856\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTjNKNP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1072"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --field-trial-handle=1996,i,3888499534003619586,4328887081420140704,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
135.0.7049.115
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeTjNKNP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=1996,i,3888499534003619586,4328887081420140704,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.115
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1228"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=1996,i,3888499534003619586,4328887081420140704,262144 --variations-seed-version --mojo-platform-channel-handle=3940 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.115
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.115\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
24 757
Read events
23 008
Write events
1 709
Delete events
40

Modification events

(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000008F4BD9C310B9DB0198170000180C0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000F7AEDBC310B9DB0198170000180C0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
480000000000000050D752C410B9DB0198170000180C0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
480000000000000050D752C410B9DB0198170000180C0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000DB0C5AC410B9DB0198170000180C0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000008A745CC410B9DB0198170000180C0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6040) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(5380) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
4800000000000000FB74EBC410B9DB0104150000001A0000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5380) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(5380) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
Executable files
162
Suspicious files
153
Text files
97
Unknown types
0

Dropped files

PID
Process
Filename
Type
4724谷歌安装包_19.25.13.exeC:\Users\admin\AppData\Roaming\TargetCommandSwiftUI\Installation Database 1.0.0\install\holder0.aiph
MD5:
SHA256:
4724谷歌安装包_19.25.13.exeC:\Users\admin\AppData\Roaming\TargetCommandSwiftUI\Installation Database 1.0.0\install\5DE3BAC\转接口.msi
MD5:
SHA256:
6040msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6040msiexec.exeC:\Windows\Installer\113fd5.msi
MD5:
SHA256:
4724谷歌安装包_19.25.13.exeC:\Users\admin\AppData\Roaming\TargetCommandSwiftUI\Installation Database 1.0.0\install\5DE3BAC\CommonAppDataFolder\backup\LineInst.exe
MD5:
SHA256:
4724谷歌安装包_19.25.13.exeC:\Users\admin\AppData\Local\Temp\MSIF273.tmpexecutable
MD5:AE463676775A1DD0B7A28DDB265B4065
SHA256:83FBFCAFF3DA3EB89F9AEC29E6574CF15502FD670CBB2AB0C8A84451B2598B22
6040msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:44F0C931BDF71718EECE248C69E38039
SHA256:0FDFDE2F4D5E7AF1C27D5281CB6E1DF27A324FEFEBBBDC5E701AEB491264E46F
4724谷歌安装包_19.25.13.exeC:\Users\admin\AppData\Local\Temp\shiF09B.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
6040msiexec.exeC:\Windows\Installer\MSI40FE.tmpexecutable
MD5:C7FBD5EE98E32A77EDF1156DB3FCA622
SHA256:E140990B509DD6884A5742BDE64F2CDAA10012D472B0B32DE43EBECBC83242B6
4724谷歌安装包_19.25.13.exeC:\Users\admin\AppData\Local\Temp\MSIF139.tmpexecutable
MD5:C7FBD5EE98E32A77EDF1156DB3FCA622
SHA256:E140990B509DD6884A5742BDE64F2CDAA10012D472B0B32DE43EBECBC83242B6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
62
DNS requests
67
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.40:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3300
GoogleUpdate.exe
GET
200
142.250.185.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
3300
GoogleUpdate.exe
GET
200
142.250.185.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
3300
GoogleUpdate.exe
GET
200
172.217.16.131:80
http://o.pki.goog/we2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEQDQZgpWpezrXAmFnbj86J49
unknown
whitelisted
5048
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/ackxpvrm3yhql4zsr7kcxuakkwkq_135.0.7049.115/135.0.7049.115_chrome_installer.exe
unknown
whitelisted
5048
svchost.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/ackxpvrm3yhql4zsr7kcxuakkwkq_135.0.7049.115/135.0.7049.115_chrome_installer.exe
unknown
whitelisted
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2552
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2552
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.40:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.66:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2552
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2552
SIHClient.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.40
  • 2.16.164.99
  • 2.16.164.83
  • 2.16.164.9
  • 2.16.164.41
  • 2.16.164.98
  • 2.16.164.32
  • 2.16.164.131
  • 2.16.164.26
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.66
  • 40.126.32.136
  • 20.190.160.67
  • 20.190.160.64
  • 20.190.160.4
  • 20.190.160.3
  • 40.126.32.134
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
go.microsoft.com
  • 2.18.97.227
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
5048
svchost.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
5048
svchost.exe
Misc activity
ET INFO EXE - Served Attached HTTP
5048
svchost.exe
Misc activity
ET INFO Packed Executable Download
684
svchost.exe
Malware Command and Control Activity Detected
ET MALWARE FatalRAT CnC Activity
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info