URL:

iup.360safe.com

Full analysis: https://app.any.run/tasks/d5b122be-7162-4fc7-a45a-bfc5de73cb0f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 30, 2024, 16:52:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
qrcode
stealer
vmprotect
Indicators:
MD5:

D08781E22A410D02B30B2EECE7CCBC43

SHA1:

6ABC6503BA126A97A961D58087D1D7940071A9B8

SHA256:

6D189EBC1A02956AFE20AE9F59150CED6CE5366D7C2CBB44A3B4B4638FA56980

SSDEEP:

3:RyWEcLK:MZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • setupbeta_jisu.exe (PID: 6260)
    • Actions looks like stealing of personal data

      • setupbeta_jisu.exe (PID: 6260)
      • regsvr32.exe (PID: 6140)
      • 360SecLogonHelper.exe (PID: 3316)
      • EaInstHelper.exe (PID: 6508)
      • EaInstHelper64.exe (PID: 4080)
      • PopWndTracker.exe (PID: 6644)
      • ZhuDongFangYu.exe (PID: 1436)
      • PowerSaver.exe (PID: 6652)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
      • 360Safe.exe (PID: 5900)
      • ZhuDongFangYu.exe (PID: 1440)
      • ZhuDongFangYu.exe (PID: 5112)
      • regsvr32.exe (PID: 4196)
      • regsvr32.exe (PID: 4016)
      • regsvr32.exe (PID: 2568)
      • AdvUtils.exe (PID: 4448)
    • Changes the autorun value in the registry

      • setupbeta_jisu.exe (PID: 6260)
    • Registers / Runs the DLL via REGSVR32.EXE

      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
    • Drops 7-zip archiver for unpacking

      • setupbeta_jisu.exe (PID: 6260)
    • Executable content was dropped or overwritten

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • 360tray.exe (PID: 1640)
    • Drops the executable file immediately after the start

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • 360tray.exe (PID: 1640)
    • Process requests binary or script from the Internet

      • setupbeta_jisu.exe (PID: 6260)
    • Drops a system driver (possible attempt to evade defenses)

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • 360tray.exe (PID: 1640)
    • Creates a software uninstall entry

      • setupbeta_jisu.exe (PID: 6260)
    • Reads the date of Windows installation

      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 6140)
      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
      • regsvr32.exe (PID: 4016)
      • regsvr32.exe (PID: 4196)
    • The process verifies whether the antivirus software is installed

      • regsvr32.exe (PID: 6140)
      • 360SecLogonHelper.exe (PID: 3316)
      • PopWndTracker.exe (PID: 6644)
      • EaInstHelper.exe (PID: 6508)
      • EaInstHelper64.exe (PID: 4080)
      • PowerSaver.exe (PID: 6652)
      • ZhuDongFangYu.exe (PID: 1436)
      • ZhuDongFangYu.exe (PID: 1440)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
      • 360Safe.exe (PID: 5900)
      • regsvr32.exe (PID: 4196)
      • regsvr32.exe (PID: 4016)
      • regsvr32.exe (PID: 2568)
      • AdvUtils.exe (PID: 4448)
      • ZhuDongFangYu.exe (PID: 5112)
      • setupbeta_jisu.exe (PID: 6260)
    • Creates files in the driver directory

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
    • Creates or modifies Windows services

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • 360tray.exe (PID: 1640)
    • Checks Windows Trust Settings

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Changes default file association

      • 360tray.exe (PID: 1640)
    • Executes as Windows Service

      • ZhuDongFangYu.exe (PID: 5112)
    • The process checks if it is being run in the virtual environment

      • 360tray.exe (PID: 1640)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 6200)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 6200)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 6200)
    • Reads the software policy settings

      • slui.exe (PID: 3140)
      • slui.exe (PID: 6004)
      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • The process uses the downloaded file

      • chrome.exe (PID: 780)
      • chrome.exe (PID: 6200)
      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • Reads the computer name

      • setupbeta_jisu.exe (PID: 6260)
      • 360SecLogonHelper.exe (PID: 3316)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • 360tray.exe (PID: 1640)
      • ZhuDongFangYu.exe (PID: 1440)
      • 360Safe.exe (PID: 5900)
      • ZhuDongFangYu.exe (PID: 5112)
      • SoftupNotify.exe (PID: 6568)
    • Checks proxy server information

      • setupbeta_jisu.exe (PID: 6260)
      • slui.exe (PID: 6004)
      • 360tray.exe (PID: 1640)
    • Checks supported languages

      • setupbeta_jisu.exe (PID: 6260)
      • 360SecLogonHelper.exe (PID: 3316)
      • PopWndTracker.exe (PID: 6644)
      • EaInstHelper.exe (PID: 6508)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • PowerSaver.exe (PID: 6652)
      • 360tray.exe (PID: 1640)
      • 360Safe.exe (PID: 5900)
      • SoftupNotify.exe (PID: 6568)
      • ZhuDongFangYu.exe (PID: 1440)
      • ZhuDongFangYu.exe (PID: 5112)
      • AdvUtils.exe (PID: 4448)
    • Create files in a temporary directory

      • setupbeta_jisu.exe (PID: 6260)
    • Creates files or folders in the user directory

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Creates files in the program directory

      • setupbeta_jisu.exe (PID: 6260)
      • PopWndTracker.exe (PID: 6644)
      • ZhuDongFangYu.exe (PID: 5112)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
    • VMProtect protector has been detected

      • setupbeta_jisu.exe (PID: 6260)
    • Dropped object may contain TOR URL's

      • setupbeta_jisu.exe (PID: 6260)
    • Process checks computer location settings

      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • Reads Environment values

      • setupbeta_jisu.exe (PID: 6260)
    • Reads the machine GUID from the registry

      • 360SecLogonHelper.exe (PID: 3316)
      • setupbeta_jisu.exe (PID: 6260)
      • 360Safe.exe (PID: 5900)
      • 360tray.exe (PID: 1640)
    • Process checks whether UAC notifications are on

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Disables trace logs

      • setupbeta_jisu.exe (PID: 6260)
      • 360Safe.exe (PID: 5900)
      • ZhuDongFangYu.exe (PID: 5112)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
183
Monitored processes
45
Malicious processes
15
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe chrome.exe no specs chrome.exe no specs setupbeta_jisu.exe no specs THREAT setupbeta_jisu.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs regsvr32.exe bcdedit.exe no specs conhost.exe no specs bcdedit.exe no specs conhost.exe no specs 360seclogonhelper.exe popwndtracker.exe eainsthelper.exe eainsthelper64.exe zhudongfangyu.exe powersaver.exe 360tray.exe 360safe.exe softupnotify.exe zhudongfangyu.exe zhudongfangyu.exe regsvr32.exe regsvr32.exe regsvr32.exe advutils.exe

Process information

PID
CMD
Path
Indicators
Parent process
304"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
608"C:\WINDOWS\Sysnative\bcdedit.exe" /set {bootmgr} flightsigning onC:\Windows\System32\bcdedit.exesetupbeta_jisu.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cryptsp.dll
780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5356 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5364 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exebcdedit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1436"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /InstallC:\Program Files (x86)\360\360Safe\deepscan\ZhuDongFangYu.exe
setupbeta_jisu.exe
User:
admin
Company:
360.cn
Integrity Level:
HIGH
Description:
360主动防御服务模块
Exit code:
0
Version:
3, 2, 2, 3100
Modules
Images
c:\program files (x86)\360\360safe\deepscan\zhudongfangyu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1440"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /StartC:\Program Files (x86)\360\360Safe\deepscan\ZhuDongFangYu.exe
setupbeta_jisu.exe
User:
admin
Company:
360.cn
Integrity Level:
HIGH
Description:
360主动防御服务模块
Exit code:
0
Version:
3, 2, 2, 3100
Modules
Images
c:\program files (x86)\360\360safe\deepscan\zhudongfangyu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1568"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5080 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1640"C:\Program Files (x86)\360\360Safe\safemon\360tray.exe" /TrayInstall /clean /showtrayiconC:\Program Files (x86)\360\360Safe\safemon\360tray.exe
setupbeta_jisu.exe
User:
admin
Company:
360.cn
Integrity Level:
HIGH
Description:
360安全防护中心模块
Version:
12, 0, 0, 1941
Modules
Images
c:\program files (x86)\360\360safe\safemon\360tray.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1828"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5024 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
53 245
Read events
44 115
Write events
3 963
Delete events
5 167

Modification events

(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
474
Suspicious files
581
Text files
578
Unknown types
224

Dropped files

PID
Process
Filename
Type
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF12ab0d.TMP
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF12ab1d.TMP
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:FC81892AC822DCBB09441D3B58B47125
SHA256:FB077C966296D02D50CCBF7F761D2A3311A206A784A7496F331C2B0D6AD205C8
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\99f3ce0e-8ad9-4195-ac4d-9c48999a19e1.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
245
TCP/UDP connections
120
DNS requests
101
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5712
chrome.exe
GET
403
151.236.71.147:80
http://iup.360safe.com/
unknown
whitelisted
5712
chrome.exe
GET
404
151.236.71.147:80
http://iup.360safe.com/favicon.ico
unknown
whitelisted
6816
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5712
chrome.exe
GET
200
18.245.60.66:80
http://s.ssl.qhimg.com/static/5026c8045e19af4c.css
unknown
whitelisted
5712
chrome.exe
GET
200
101.226.4.13:80
http://360safe.com/
unknown
whitelisted
5712
chrome.exe
GET
200
18.245.60.66:80
http://s.ssl.qhimg.com/static/0b5ad4ca61ebb85c.css
unknown
whitelisted
5712
chrome.exe
GET
200
18.245.60.66:80
http://s.ssl.qhimg.com/static/3a56b28eba98cb2e.css
unknown
whitelisted
5712
chrome.exe
GET
200
18.245.60.66:80
http://s.ssl.qhimg.com/static/0729c697c74a3b98.js
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.23:80
http://p5.ssl.qhimg.com/t01df3c9f714780c423.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.23:80
http://p5.ssl.qhimg.com/t01e133734769d83f7d.png
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6232
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6404
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6200
chrome.exe
239.255.255.250:1900
whitelisted
5712
chrome.exe
74.125.143.84:443
accounts.google.com
GOOGLE
US
whitelisted
5712
chrome.exe
151.236.71.147:443
iup.360safe.com
CDNetworks LLC
RU
whitelisted
5712
chrome.exe
151.236.71.147:80
iup.360safe.com
CDNetworks LLC
RU
whitelisted
6200
chrome.exe
224.0.0.251:5353
unknown
6232
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.184.238
whitelisted
iup.360safe.com
  • 151.236.71.147
whitelisted
accounts.google.com
  • 74.125.143.84
whitelisted
www.google.com
  • 142.250.185.228
  • 142.250.186.132
whitelisted
360safe.com
  • 101.226.4.13
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
s.ssl.qhimg.com
  • 18.245.60.66
  • 18.245.60.55
  • 18.245.60.92
  • 18.245.60.40
whitelisted

Threats

No threats detected
No debug info