URL:

https://cdn-staging.livechat-files.com/api/file/lc/att/1520/aad6ba498e05cf6da2d85e8af7e5e36d/IMG_8729.scr91.92.255.73

Full analysis: https://app.any.run/tasks/7e3fd102-92fc-4680-82ef-6b11b39d93db
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 01, 2024, 14:58:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
spectrerat
stealer
Indicators:
MD5:

E55E561B2E063B355FB35FA876826D07

SHA1:

B350DDFA74FAF66A34CA868112296A4CAD55A198

SHA256:

553BA23D22AA6A390B68342E903FECC04BD54E19A57BD03E0EA43225D0B5DFB4

SSDEEP:

3:N8cHaLZS+MOzf9OE6UCxhVTDTyZus2hBXRkn:2cHaLZHMOzfkE6UqVPej2hhqn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for commands execution

      • msedge.exe (PID: 1248)
      • msedge.exe (PID: 1812)
    • SPECTRERAT has been detected (YARA)

      • NumaraSoftwarePackage.exe (PID: 8076)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
    • Connects to the CnC server

      • msedge.exe (PID: 1248)
    • Actions looks like stealing of personal data

      • Robocopy.exe (PID: 936)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • explorer.exe (PID: 4552)
    • Starts application with an unusual extension

      • explorer.exe (PID: 4552)
    • Executable content was dropped or overwritten

      • IMG_8729.scr (PID: 7796)
      • kedb.exe (PID: 7384)
      • kedb.exe (PID: 752)
    • Reads security settings of Internet Explorer

      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
    • Reads the date of Windows installation

      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
    • Hides command output

      • cmd.exe (PID: 7844)
    • Starts CMD.EXE for commands execution

      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7860)
      • cmd.exe (PID: 7724)
      • cmd.exe (PID: 1172)
      • cmd.exe (PID: 1488)
      • cmd.exe (PID: 5744)
      • cmd.exe (PID: 8124)
      • cmd.exe (PID: 7204)
      • cmd.exe (PID: 7504)
      • cmd.exe (PID: 5924)
      • cmd.exe (PID: 7632)
      • cmd.exe (PID: 7952)
      • cmd.exe (PID: 4936)
      • cmd.exe (PID: 2960)
      • cmd.exe (PID: 3980)
      • cmd.exe (PID: 7716)
      • cmd.exe (PID: 7280)
      • cmd.exe (PID: 3696)
      • cmd.exe (PID: 6952)
      • cmd.exe (PID: 1120)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 7844)
    • The executable file from the user directory is run by the CMD process

      • NumaraSoftwarePackage.exe (PID: 8076)
      • PsInfo.exe (PID: 7464)
      • kedb.exe (PID: 7384)
      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
      • kedb.exe (PID: 752)
      • 7za.exe (PID: 2468)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 6148)
    • Accesses antivirus product name via WMI (SCRIPT)

      • WMIC.exe (PID: 5464)
    • Uses SYSTEMINFO.EXE to read the environment

      • cmd.exe (PID: 3980)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3980)
    • Contacting a server suspected of hosting an CnC

      • msedge.exe (PID: 1248)
    • Searches for installed software

      • PsInfo.exe (PID: 7464)
      • PsInfo64.exe (PID: 1120)
    • Reads the Windows owner or organization settings

      • PsInfo.exe (PID: 7464)
      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
    • The process checks if it is being run in the virtual environment

      • PsInfo.exe (PID: 7464)
      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
    • Lists all scheduled tasks

      • schtasks.exe (PID: 7680)
      • schtasks.exe (PID: 7028)
      • schtasks.exe (PID: 7652)
      • schtasks.exe (PID: 7552)
      • schtasks.exe (PID: 7088)
      • schtasks.exe (PID: 6896)
      • schtasks.exe (PID: 8128)
      • schtasks.exe (PID: 6888)
      • schtasks.exe (PID: 2524)
      • schtasks.exe (PID: 7200)
  • INFO

    • Checks supported languages

      • TextInputHost.exe (PID: 6996)
      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • kedb.exe (PID: 7384)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
      • PsInfo.exe (PID: 7464)
      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
      • kedb.exe (PID: 752)
      • NumaraSoftwarePackage.exe (PID: 4084)
      • NumaraSoftwarePackage.exe (PID: 6672)
      • 7za.exe (PID: 2468)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 6308)
      • chrome.exe (PID: 8072)
      • msedge.exe (PID: 1248)
      • msedge.exe (PID: 1812)
    • Application launched itself

      • chrome.exe (PID: 6308)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 6308)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4552)
      • WMIC.exe (PID: 5464)
    • The process uses the downloaded file

      • chrome.exe (PID: 7544)
      • explorer.exe (PID: 4552)
      • IMG_8729.scr (PID: 7796)
      • msedge.exe (PID: 1812)
    • Reads the software policy settings

      • explorer.exe (PID: 4552)
    • Checks proxy server information

      • explorer.exe (PID: 4552)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 4552)
      • kedb.exe (PID: 7384)
      • kedb.exe (PID: 752)
      • Robocopy.exe (PID: 936)
      • 7za.exe (PID: 2468)
    • Reads the computer name

      • TextInputHost.exe (PID: 6996)
      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • PsInfo.exe (PID: 7464)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
      • 7za.exe (PID: 2468)
    • Manual execution by a user

      • IMG_8729.scr (PID: 7796)
    • Create files in a temporary directory

      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
    • Process checks computer location settings

      • IMG_8729.scr (PID: 7796)
      • NumaraSoftwarePackage.exe (PID: 8076)
      • a2-stl-0729-early-(1)-TESTED.exe (PID: 7704)
    • Reads CPU info

      • PsInfo.exe (PID: 7464)
      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
    • Reads Environment values

      • PsInfo64.exe (PID: 1120)
      • PsInfo.exe (PID: 7464)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
    • Reads product name

      • PsInfo64.exe (PID: 1120)
      • PsInfo64.exe (PID: 6244)
      • PsInfo64.exe (PID: 6156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
326
Monitored processes
183
Malicious processes
15
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs textinputhost.exe no specs chrome.exe no specs rundll32.exe no specs explorer.exe img_8729.scr cmd.exe no specs conhost.exe no specs ping.exe no specs #SPECTRERAT numarasoftwarepackage.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs chrome.exe chrome.exe no specs msedge.exe cmd.exe no specs conhost.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs kedb.exe cmd.exe no specs conhost.exe no specs systeminfo.exe no specs findstr.exe no specs chrome.exe no specs tiworker.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs chrome.exe no specs #SPECTRERAT a2-stl-0729-early-(1)-tested.exe no specs cmd.exe no specs conhost.exe no specs psinfo.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs psinfo64.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs psinfo64.exe no specs psinfo64.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs msedge.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs kedb.exe cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs robocopy.exe cmd.exe no specs conhost.exe no specs 7za.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs numarasoftwarepackage.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs numarasoftwarepackage.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
376\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
752kedb.exe -o jucq_x64.zipC:\Users\admin\AppData\Roaming\VirtualComputerToolkit\kedb.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\virtualcomputertoolkit\kedb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
936robocopy "C:\Users\admin\AppData\Roaming\Mozilla\Firefox" "C:\Users\admin\AppData\Roaming\Mozilla\Firefoxcopy" /E /XF *.lock favicons.sqlite favicons.sqlite-shm favicons.sqlite-wal /XD "Background Tasks Profiles" "Pending Pings" "Crash Reports" bookmarkbackups browser-extension-data features personality-provider settings crashes datareporting extensions minidumps saved-telemetry-pings security_state sessionstore-backups storage weave gmp-widevinecdm gmp-gmpopenh264C:\Windows\System32\Robocopy.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Robocopy
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\robocopy.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1044"C:\Windows\System32\cmd.exe" /C REG QUERY HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v VirtualComputerToolkitC:\Windows\System32\cmd.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1104findstr /C:"OS Name" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
1108"C:\Windows\System32\cmd.exe" /C SCHTASKS /QUERY /TN MyTasks\VirtualComputerToolkitC:\Windows\System32\cmd.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1120"C:\Users\admin\AppData\Roaming\VirtualComputerToolkit\PsInfo64.exe" -s /accepteula applications C:\Users\admin\AppData\Roaming\VirtualComputerToolkit\PsInfo64.execmd.exe
User:
admin
Company:
Sysinternals - www.sysinternals.com
Integrity Level:
MEDIUM
Description:
Local and remote system information viewer
Exit code:
0
Version:
1.78
Modules
Images
c:\users\admin\appdata\roaming\virtualcomputertoolkit\psinfo64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\msvcrt.dll
1120"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 60C:\Windows\System32\cmd.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1172"C:\Windows\System32\cmd.exe" /C TIMEOUT /T 10C:\Windows\System32\cmd.exeNumaraSoftwarePackage.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
67 389
Read events
67 153
Write events
173
Delete events
63

Modification events

(PID) Process:(4552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000F028A
Operation:writeName:VirtualDesktop
Value:
1000000030304456033BCEE44DE41B4E8AEC331E84F566D2
(PID) Process:(4552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage\AppBadgeUpdated
Operation:writeName:Chrome
Value:
5
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6308) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
Executable files
17
Suspicious files
197
Text files
69
Unknown types
38

Dropped files

PID
Process
Filename
Type
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RFe7aaa.TMP
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RFe7ab9.TMP
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFe7a6b.TMPtext
MD5:8F45965291AB2DA10EEB049FB6E917C6
SHA256:8A0DE526945B27CDBBD87357C85FDDD37B572370F894CB0A5AC533FD465D2166
6308chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\743addd0-3deb-4520-9e93-235c6d55c366.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
141
TCP/UDP connections
72
DNS requests
36
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5300
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5300
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7060
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7112
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4552
explorer.exe
GET
200
2.18.64.86:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRIH1V64SBkA%2BzJQVQ6VFBAcvLB3wQUtqFUOQLDoD%2BOirz61PgcptE6Dv0CEQC78My1t7gx%2FSGuMneK5AyJ
unknown
whitelisted
4552
explorer.exe
GET
200
2.18.64.86:80
http://cevcsca2021.ocsp-certum.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR2rKuShFxBxX%2BVZ%2F8jiOwbsyptXQQUrFfKCBbcP8UxHApN2%2Fvx3pknLTQCEHEck3IiUUKT7QGna8h3sgM%3D
unknown
unknown
7944
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/kct3f2b256c6ad54mamrbriypm_3037/jflookgnkcckhobaglndicnbbgbonegd_3037_all_acsnwcofavbntb2tnme2h7xagkka.crx3
unknown
whitelisted
7944
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/kct3f2b256c6ad54mamrbriypm_3037/jflookgnkcckhobaglndicnbbgbonegd_3037_all_acsnwcofavbntb2tnme2h7xagkka.crx3
unknown
whitelisted
7944
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/kct3f2b256c6ad54mamrbriypm_3037/jflookgnkcckhobaglndicnbbgbonegd_3037_all_acsnwcofavbntb2tnme2h7xagkka.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
1420
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
2472
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3888
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
unknown
6308
chrome.exe
239.255.255.250:1900
unknown
74.125.71.84:443
accounts.google.com
GOOGLE
US
unknown
2.16.1.243:443
cdn-staging.livechat-files.com
Akamai International B.V.
NL
unknown
5336
SearchApp.exe
184.86.251.19:443
www.bing.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
unknown
google.com
  • 172.217.18.14
unknown
cdn-staging.livechat-files.com
  • 2.16.1.243
  • 2.16.1.160
unknown
accounts.google.com
  • 74.125.71.84
unknown
www.bing.com
  • 184.86.251.19
  • 184.86.251.23
  • 184.86.251.17
  • 184.86.251.28
  • 184.86.251.25
  • 184.86.251.20
  • 184.86.251.9
  • 184.86.251.21
  • 184.86.251.24
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
client.wns.windows.com
  • 40.113.103.199
unknown
login.live.com
  • 40.126.32.76
  • 40.126.32.72
  • 40.126.32.133
  • 40.126.32.74
  • 40.126.32.138
  • 40.126.32.136
  • 20.190.160.20
  • 40.126.32.134
unknown
www.google.com
  • 142.250.186.68
  • 172.217.18.4
unknown
th.bing.com
  • 184.86.251.28
  • 184.86.251.21
  • 184.86.251.9
  • 184.86.251.23
  • 184.86.251.25
  • 184.86.251.24
  • 184.86.251.17
  • 184.86.251.20
  • 184.86.251.19
unknown

Threats

PID
Process
Class
Message
1248
msedge.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 13
1248
msedge.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
1248
msedge.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
3 ETPRO signatures available at the full report
No debug info