File name:

Redline_2021_stealer-main.rar

Full analysis: https://app.any.run/tasks/0c7adbcd-2be8-4dc9-94e9-1b893d779395
Verdict: Malicious activity
Analysis date: January 30, 2022, 18:59:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

5834A2F9DD05A8FBF390B133D618CF77

SHA1:

1F9DEC6D14B58878024C5360E4A3F013CD019866

SHA256:

4B0BCA466528875369A4934E92A1156F68F4919A0B99872788B65A0315881873

SSDEEP:

393216:VoIxpiFTnpx1eJ/p4kZZc9RosoKm6NMaEcqpHVtckzM:ZpGnv0JptZc9RoymgMaEcqeJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3032)
      • Explorer.EXE (PID: 1656)
      • GoogleUpdate.exe (PID: 2168)
      • GoogleUpdate.exe (PID: 2676)
    • Application was dropped or rewritten from another process

      • Kurome.Builder.exe (PID: 576)
      • Kurome.Host.exe (PID: 2580)
      • Kurome.Loader.exe (PID: 496)
      • Chrome.exe (PID: 2696)
      • GoogleUpdateSetup.exe (PID: 3080)
      • GoogleUpdate.exe (PID: 2168)
      • GoogleUpdate.exe (PID: 2676)
    • Drops executable file immediately after starts

      • Chrome.exe (PID: 2696)
      • GoogleUpdateSetup.exe (PID: 3080)
    • Changes settings of System certificates

      • GoogleUpdate.exe (PID: 3364)
  • SUSPICIOUS

    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 1604)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 1604)
      • Chrome.exe (PID: 2696)
      • GoogleUpdateSetup.exe (PID: 3080)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1604)
      • GoogleUpdateSetup.exe (PID: 3080)
      • Chrome.exe (PID: 2696)
    • Checks supported languages

      • WinRAR.exe (PID: 1604)
      • Kurome.Builder.exe (PID: 576)
      • Kurome.Host.exe (PID: 2580)
      • Kurome.Loader.exe (PID: 496)
      • Chrome.exe (PID: 2696)
      • GoogleUpdate.exe (PID: 2168)
      • GoogleUpdateSetup.exe (PID: 3080)
      • GoogleUpdate.exe (PID: 2676)
      • GoogleUpdate.exe (PID: 3268)
      • GoogleUpdate.exe (PID: 3364)
      • GoogleUpdate.exe (PID: 2508)
      • GoogleUpdate.exe (PID: 3576)
    • Reads the computer name

      • WinRAR.exe (PID: 1604)
      • GoogleUpdate.exe (PID: 2168)
      • GoogleUpdate.exe (PID: 2676)
      • GoogleUpdate.exe (PID: 2508)
      • GoogleUpdate.exe (PID: 3364)
      • GoogleUpdate.exe (PID: 3576)
    • Creates files in the user directory

      • Explorer.EXE (PID: 1656)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1656)
    • Creates a directory in Program Files

      • GoogleUpdateSetup.exe (PID: 3080)
    • Creates files in the program directory

      • GoogleUpdateSetup.exe (PID: 3080)
    • Adds / modifies Windows certificates

      • GoogleUpdate.exe (PID: 3364)
    • Application launched itself

      • GoogleUpdate.exe (PID: 2508)
  • INFO

    • Manual execution by user

      • Kurome.Builder.exe (PID: 576)
    • Checks supported languages

      • NOTEPAD.EXE (PID: 652)
      • Explorer.EXE (PID: 1656)
    • Reads settings of System Certificates

      • GoogleUpdate.exe (PID: 3364)
      • GoogleUpdate.exe (PID: 2508)
      • GoogleUpdate.exe (PID: 3576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
15
Malicious processes
10
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe searchprotocolhost.exe no specs kurome.builder.exe no specs explorer.exe no specs kurome.host.exe no specs kurome.loader.exe no specs notepad.exe no specs chrome.exe googleupdate.exe no specs googleupdatesetup.exe googleupdate.exe no specs googleupdate.exe no specs googleupdate.exe googleupdate.exe googleupdate.exe

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Loader\Kurome.Loader.exe" C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Loader\Kurome.Loader.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Kurome.Loader
Exit code:
2148734720
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\redline_2021_stealer-main\redline_2021_stealer-main\kurome.loader\kurome.loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
576"C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Kurome.Builder.exe" C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Kurome.Builder.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Kurome.Builder
Exit code:
2148734720
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\redline_2021_stealer-main\redline_2021_stealer-main\kurome.builder\kurome.builder.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\rpcrt4.dll
652"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\ReadMe.txtC:\Windows\system32\NOTEPAD.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1604"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Redline_2021_stealer-main.rar"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1656C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2168C:\Users\admin\AppData\Local\Temp\GUM8CCD.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"C:\Users\admin\AppData\Local\Temp\GUM8CCD.tmp\GoogleUpdate.exeChrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Installer
Exit code:
2147747856
Version:
1.3.34.11
Modules
Images
c:\users\admin\appdata\local\temp\gum8ccd.tmp\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2508"C:\Program Files\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{DAB74A2B-F34A-4039-B13C-15F044EE0030}"C:\Program Files\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
admin
Company:
Google Inc.
Integrity Level:
HIGH
Description:
Google Installer
Exit code:
2147747856
Version:
1.3.33.23
Modules
Images
c:\program files\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
2580"C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Host\Kurome.Host.exe" C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Host\Kurome.Host.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Kurome.Host
Exit code:
2148734720
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\redline_2021_stealer-main\redline_2021_stealer-main\kurome.host\kurome.host.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2676"C:\Program Files\GUM9161.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={147E1A31-5E49-ACD4-7646-E2EE6FA22B56}&lang=ru&browser=3&usagestats=0&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installelevatedC:\Program Files\GUM9161.tmp\GoogleUpdate.exeGoogleUpdateSetup.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Exit code:
2147747856
Version:
1.3.34.11
Modules
Images
c:\program files\gum9161.tmp\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
2696"C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Panel\RedLine_20_2\Tools\Chrome.exe" C:\Users\admin\Desktop\Redline_2021_stealer-main\Redline_2021_stealer-main\Panel\RedLine_20_2\Tools\Chrome.exe
Explorer.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Update Setup
Exit code:
2147747856
Version:
1.3.34.11
Modules
Images
c:\users\admin\desktop\redline_2021_stealer-main\redline_2021_stealer-main\panel\redline_20_2\tools\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ole32.dll
Total events
21 890
Read events
21 137
Write events
748
Delete events
5

Modification events

(PID) Process:(1656) Explorer.EXEKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1604) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Redline_2021_stealer-main.rar
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
155
Suspicious files
6
Text files
11
Unknown types
5

Dropped files

PID
Process
Filename
Type
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Kurome.Builder.exeexecutable
MD5:CF38A4BDE3FE5456DCAF2B28D3BFB709
SHA256:C47B78E566425FC4165A83B2661313E41EE8D66241F7BEA7723304A6A751595E
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.dllexecutable
MD5:DE69BB29D6A9DFB615A90DF3580D63B1
SHA256:F66F97866433E688ACC3E4CD1E6EF14505F81DF6B26DD6215E376767F6F954BC
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.Mdb.pdbbinary
MD5:073D9D6C9C71F66151B84A376EDE4A9D
SHA256:891251514AA16F94485263C52FABA51BB5BB3495B9FAD382C74F6C9DA78718DD
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.Pdb.dllexecutable
MD5:6D5EB860C2BE5DBEB470E7D3F3E7DDA4
SHA256:447EDE1984BB4ACD73BD97C0EC57A11C079CEE8301C91FB199CA98C1906D3CC4
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Kurome.Builder.pdbpdb
MD5:E0468434C2489D74199641856A9C2265
SHA256:713276677BCFB9FED27D545AB0B3591BF11FA9D6DD22739A00D43CB916A1A73F
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.Mdb.dllexecutable
MD5:1C6ACA0F1B1FA1661FC1E43C79334F7C
SHA256:411F8ED8C49738FA38A56ED8F991D556227D13602E83186E66AE1C4F821C940B
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.pdbbinary
MD5:9A345FCE8746876DB39AA5622A771163
SHA256:ECF13638359A5A9FE271966924CF543C4B440C2DC274E9D94069EF50BBC95482
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.Pdb.pdbbinary
MD5:711C5F65BD140E72EE30B33F14FBF100
SHA256:7C3A6B12EF0676D3DC80A4E2B790F3DEC4D7FDAA182B2181C3F6EE283B118A9E
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.Rocks.dllexecutable
MD5:6E7F0F4FFF6C49E3F66127C23B7F1A53
SHA256:2E2623319BDC362974A78EA4A43F4893011EC257884D24267F4594142FCD436E
1604WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa1604.33445\Redline_2021_stealer-main\Redline_2021_stealer-main\Kurome.Builder\Mono.Cecil.Rocks.pdbbinary
MD5:4C98B54BF658DB95DFB4D1AE6BED2565
SHA256:5FCF9491B8D73F1F90A83EE7BDA9097043903BA18822F1F22EACF92338B0D619
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
7
DNS requests
4
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
924
svchost.exe
HEAD
403
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe
US
whitelisted
924
svchost.exe
HEAD
302
142.250.186.142:80
http://redirector.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe
US
whitelisted
924
svchost.exe
GET
173.194.5.203:80
http://r5---sn-aigl6n76.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe?cms_redirect=yes&mh=Pg&mip=185.217.117.59&mm=28&mn=sn-aigl6n76&ms=nvh&mt=1643568539&mv=u&mvi=5&pl=25&rmhost=r3---sn-aigl6n76.gvt1.com&shardbypass=yes&smhost=r3---sn-aigl6ns6.gvt1.com
US
whitelisted
2508
GoogleUpdate.exe
GET
403
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe
US
text
37 b
whitelisted
924
svchost.exe
HEAD
200
173.194.5.203:80
http://r5---sn-aigl6n76.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe?cms_redirect=yes&mh=Pg&mip=185.217.117.59&mm=28&mn=sn-aigl6n76&ms=nvh&mt=1643568539&mv=u&mvi=5&pl=25&rmhost=r3---sn-aigl6n76.gvt1.com&shardbypass=yes&smhost=r3---sn-aigl6ns6.gvt1.com
US
whitelisted
924
svchost.exe
HEAD
403
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe
US
whitelisted
2508
GoogleUpdate.exe
GET
403
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/jskl2vqav7llvnpswum2rlzxee_97.0.4692.99/97.0.4692.99_chrome_installer.exe
US
text
37 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3364
GoogleUpdate.exe
142.250.185.99:443
update.googleapis.com
Google Inc.
US
whitelisted
2508
GoogleUpdate.exe
142.250.185.99:443
update.googleapis.com
Google Inc.
US
whitelisted
924
svchost.exe
34.104.35.123:80
edgedl.me.gvt1.com
US
whitelisted
2508
GoogleUpdate.exe
34.104.35.123:80
edgedl.me.gvt1.com
US
whitelisted
924
svchost.exe
142.250.186.142:80
redirector.gvt1.com
Google Inc.
US
whitelisted
924
svchost.exe
173.194.5.203:80
r5---sn-aigl6n76.gvt1.com
Google Inc.
US
whitelisted
3576
GoogleUpdate.exe
142.250.185.99:443
update.googleapis.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
update.googleapis.com
  • 142.250.185.99
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
redirector.gvt1.com
  • 142.250.186.142
whitelisted
r5---sn-aigl6n76.gvt1.com
  • 173.194.5.203
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
1 ETPRO signatures available at the full report
No debug info