URL:

iup.360safe.com

Full analysis: https://app.any.run/tasks/d5b122be-7162-4fc7-a45a-bfc5de73cb0f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 30, 2024, 16:52:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
qrcode
stealer
vmprotect
Indicators:
MD5:

D08781E22A410D02B30B2EECE7CCBC43

SHA1:

6ABC6503BA126A97A961D58087D1D7940071A9B8

SHA256:

6D189EBC1A02956AFE20AE9F59150CED6CE5366D7C2CBB44A3B4B4638FA56980

SSDEEP:

3:RyWEcLK:MZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • setupbeta_jisu.exe (PID: 6260)
    • Actions looks like stealing of personal data

      • setupbeta_jisu.exe (PID: 6260)
      • regsvr32.exe (PID: 6140)
      • 360SecLogonHelper.exe (PID: 3316)
      • PopWndTracker.exe (PID: 6644)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • PowerSaver.exe (PID: 6652)
      • 360tray.exe (PID: 1640)
      • 360Safe.exe (PID: 5900)
      • SoftupNotify.exe (PID: 6568)
      • ZhuDongFangYu.exe (PID: 1440)
      • ZhuDongFangYu.exe (PID: 5112)
      • regsvr32.exe (PID: 2568)
      • regsvr32.exe (PID: 4196)
      • EaInstHelper.exe (PID: 6508)
      • regsvr32.exe (PID: 4016)
      • AdvUtils.exe (PID: 4448)
    • Registers / Runs the DLL via REGSVR32.EXE

      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • Changes the autorun value in the registry

      • setupbeta_jisu.exe (PID: 6260)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • 360tray.exe (PID: 1640)
    • Reads security settings of Internet Explorer

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
    • Drops the executable file immediately after the start

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • 360tray.exe (PID: 1640)
    • Drops 7-zip archiver for unpacking

      • setupbeta_jisu.exe (PID: 6260)
    • Process requests binary or script from the Internet

      • setupbeta_jisu.exe (PID: 6260)
    • Reads the date of Windows installation

      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • The process verifies whether the antivirus software is installed

      • regsvr32.exe (PID: 6140)
      • 360SecLogonHelper.exe (PID: 3316)
      • PopWndTracker.exe (PID: 6644)
      • EaInstHelper.exe (PID: 6508)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • PowerSaver.exe (PID: 6652)
      • ZhuDongFangYu.exe (PID: 1440)
      • 360Safe.exe (PID: 5900)
      • SoftupNotify.exe (PID: 6568)
      • ZhuDongFangYu.exe (PID: 5112)
      • regsvr32.exe (PID: 2568)
      • regsvr32.exe (PID: 4196)
      • 360tray.exe (PID: 1640)
      • regsvr32.exe (PID: 4016)
      • AdvUtils.exe (PID: 4448)
      • setupbeta_jisu.exe (PID: 6260)
    • Creates/Modifies COM task schedule object

      • setupbeta_jisu.exe (PID: 6260)
      • regsvr32.exe (PID: 6140)
      • 360tray.exe (PID: 1640)
      • regsvr32.exe (PID: 4196)
      • regsvr32.exe (PID: 4016)
    • Drops a system driver (possible attempt to evade defenses)

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • 360tray.exe (PID: 1640)
    • Creates a software uninstall entry

      • setupbeta_jisu.exe (PID: 6260)
    • Creates or modifies Windows services

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • 360tray.exe (PID: 1640)
    • Creates files in the driver directory

      • setupbeta_jisu.exe (PID: 6260)
      • EaInstHelper64.exe (PID: 4080)
    • Checks Windows Trust Settings

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Executes as Windows Service

      • ZhuDongFangYu.exe (PID: 5112)
    • Changes default file association

      • 360tray.exe (PID: 1640)
    • The process checks if it is being run in the virtual environment

      • 360tray.exe (PID: 1640)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 6200)
    • Reads the software policy settings

      • slui.exe (PID: 3140)
      • slui.exe (PID: 6004)
      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Checks supported languages

      • setupbeta_jisu.exe (PID: 6260)
      • 360SecLogonHelper.exe (PID: 3316)
      • EaInstHelper.exe (PID: 6508)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • PowerSaver.exe (PID: 6652)
      • 360tray.exe (PID: 1640)
      • 360Safe.exe (PID: 5900)
      • SoftupNotify.exe (PID: 6568)
      • ZhuDongFangYu.exe (PID: 1440)
      • ZhuDongFangYu.exe (PID: 5112)
      • PopWndTracker.exe (PID: 6644)
      • AdvUtils.exe (PID: 4448)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 6200)
    • Checks proxy server information

      • setupbeta_jisu.exe (PID: 6260)
      • slui.exe (PID: 6004)
      • 360tray.exe (PID: 1640)
    • Create files in a temporary directory

      • setupbeta_jisu.exe (PID: 6260)
    • The process uses the downloaded file

      • chrome.exe (PID: 780)
      • chrome.exe (PID: 6200)
      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 6200)
    • Creates files in the program directory

      • setupbeta_jisu.exe (PID: 6260)
      • PopWndTracker.exe (PID: 6644)
      • ZhuDongFangYu.exe (PID: 5112)
      • 360tray.exe (PID: 1640)
      • SoftupNotify.exe (PID: 6568)
    • Reads the computer name

      • setupbeta_jisu.exe (PID: 6260)
      • 360SecLogonHelper.exe (PID: 3316)
      • EaInstHelper64.exe (PID: 4080)
      • ZhuDongFangYu.exe (PID: 1436)
      • 360tray.exe (PID: 1640)
      • 360Safe.exe (PID: 5900)
      • ZhuDongFangYu.exe (PID: 1440)
      • ZhuDongFangYu.exe (PID: 5112)
      • SoftupNotify.exe (PID: 6568)
    • Creates files or folders in the user directory

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Dropped object may contain TOR URL's

      • setupbeta_jisu.exe (PID: 6260)
    • VMProtect protector has been detected

      • setupbeta_jisu.exe (PID: 6260)
    • Process checks computer location settings

      • setupbeta_jisu.exe (PID: 6260)
      • SoftupNotify.exe (PID: 6568)
    • Reads Environment values

      • setupbeta_jisu.exe (PID: 6260)
    • Reads the machine GUID from the registry

      • 360SecLogonHelper.exe (PID: 3316)
      • setupbeta_jisu.exe (PID: 6260)
      • 360Safe.exe (PID: 5900)
      • 360tray.exe (PID: 1640)
    • Process checks whether UAC notifications are on

      • setupbeta_jisu.exe (PID: 6260)
      • 360tray.exe (PID: 1640)
    • Disables trace logs

      • setupbeta_jisu.exe (PID: 6260)
      • 360Safe.exe (PID: 5900)
      • ZhuDongFangYu.exe (PID: 5112)
      • SoftupNotify.exe (PID: 6568)
      • 360tray.exe (PID: 1640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
183
Monitored processes
45
Malicious processes
15
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe chrome.exe no specs chrome.exe no specs setupbeta_jisu.exe no specs THREAT setupbeta_jisu.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs regsvr32.exe bcdedit.exe no specs conhost.exe no specs bcdedit.exe no specs conhost.exe no specs 360seclogonhelper.exe popwndtracker.exe eainsthelper.exe eainsthelper64.exe zhudongfangyu.exe powersaver.exe 360tray.exe 360safe.exe softupnotify.exe zhudongfangyu.exe zhudongfangyu.exe regsvr32.exe regsvr32.exe regsvr32.exe advutils.exe

Process information

PID
CMD
Path
Indicators
Parent process
304"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
608"C:\WINDOWS\Sysnative\bcdedit.exe" /set {bootmgr} flightsigning onC:\Windows\System32\bcdedit.exesetupbeta_jisu.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cryptsp.dll
780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5356 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5364 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exebcdedit.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1436"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /InstallC:\Program Files (x86)\360\360Safe\deepscan\ZhuDongFangYu.exe
setupbeta_jisu.exe
User:
admin
Company:
360.cn
Integrity Level:
HIGH
Description:
360主动防御服务模块
Exit code:
0
Version:
3, 2, 2, 3100
Modules
Images
c:\program files (x86)\360\360safe\deepscan\zhudongfangyu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1440"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /StartC:\Program Files (x86)\360\360Safe\deepscan\ZhuDongFangYu.exe
setupbeta_jisu.exe
User:
admin
Company:
360.cn
Integrity Level:
HIGH
Description:
360主动防御服务模块
Exit code:
0
Version:
3, 2, 2, 3100
Modules
Images
c:\program files (x86)\360\360safe\deepscan\zhudongfangyu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1568"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5080 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1640"C:\Program Files (x86)\360\360Safe\safemon\360tray.exe" /TrayInstall /clean /showtrayiconC:\Program Files (x86)\360\360Safe\safemon\360tray.exe
setupbeta_jisu.exe
User:
admin
Company:
360.cn
Integrity Level:
HIGH
Description:
360安全防护中心模块
Version:
12, 0, 0, 1941
Modules
Images
c:\program files (x86)\360\360safe\safemon\360tray.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1828"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5024 --field-trial-handle=1908,i,3286619100700855596,9709812679070740507,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
53 245
Read events
44 115
Write events
3 963
Delete events
5 167

Modification events

(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6200) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
474
Suspicious files
581
Text files
578
Unknown types
224

Dropped files

PID
Process
Filename
Type
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF12ab0d.TMP
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF12ab1d.TMP
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:FCE53E052E5CF7C20819320F374DEA88
SHA256:CD95DE277E746E92CC2C53D9FC92A8F6F0C3EDFB7F1AD9A4E9259F927065BC89
6200chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:723783C35EAEEE1492EDB30847AE6750
SHA256:C29323F784CF873BF34992E7A2B4630B19641BF42980109E31D5AF2D487DF6F8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
245
TCP/UDP connections
120
DNS requests
101
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5712
chrome.exe
GET
404
151.236.71.147:80
http://iup.360safe.com/favicon.ico
unknown
whitelisted
5712
chrome.exe
GET
403
151.236.71.147:80
http://iup.360safe.com/
unknown
whitelisted
5712
chrome.exe
GET
200
101.226.4.13:80
http://360safe.com/
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.86:80
http://p1.ssl.qhimg.com/t01c065b019438563dc.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.86:80
http://p1.ssl.qhimg.com/t01a2e1d15c0d36c7e4.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.86:80
http://p1.ssl.qhimg.com/t0124ffc462e472bfd1.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.86:80
http://p1.ssl.qhimg.com/t01c6c4e7b12bdd62e9.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.86:80
http://p1.ssl.qhimg.com/t01f854a65a49ece4da.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.86:80
http://p1.ssl.qhimg.com/t01142a5003c283acb5.png
unknown
whitelisted
5712
chrome.exe
GET
200
13.224.189.23:80
http://p0.ssl.qhimg.com/t015ff40411af4adfbc.png
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6232
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6404
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6200
chrome.exe
239.255.255.250:1900
whitelisted
5712
chrome.exe
74.125.143.84:443
accounts.google.com
GOOGLE
US
whitelisted
5712
chrome.exe
151.236.71.147:443
iup.360safe.com
CDNetworks LLC
RU
whitelisted
5712
chrome.exe
151.236.71.147:80
iup.360safe.com
CDNetworks LLC
RU
whitelisted
6200
chrome.exe
224.0.0.251:5353
unknown
6232
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.184.238
whitelisted
iup.360safe.com
  • 151.236.71.147
whitelisted
accounts.google.com
  • 74.125.143.84
whitelisted
www.google.com
  • 142.250.185.228
  • 142.250.186.132
whitelisted
360safe.com
  • 101.226.4.13
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.103.199
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.134
  • 40.126.32.133
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
s.ssl.qhimg.com
  • 18.245.60.66
  • 18.245.60.55
  • 18.245.60.92
  • 18.245.60.40
whitelisted

Threats

No threats detected
No debug info