analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://turbobit.net/download/free/r93fceckitm6

Full analysis: https://app.any.run/tasks/a04dbb67-dec9-483b-a760-7e753ad16968
Verdict: Malicious activity
Analysis date: June 27, 2022, 07:29:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

4930D76EEC8FBD9A9524A038085568A3

SHA1:

8861C1CB8BD42A5596306EE19D949327F3CF01D5

SHA256:

6D1A1AED69618FC9F204E32D1D1CEEF8214D7EBFF2EAB6B6ACB3E63B58DE3C92

SSDEEP:

3:N8YMZL0vXDCc:2YMZAv+c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • chrome.exe (PID: 3912)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2848)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3912)
    • Drops a file with a compile date too recent

      • chrome.exe (PID: 3912)
  • INFO

    • Reads the date of Windows installation

      • iexplore.exe (PID: 2520)
      • chrome.exe (PID: 1360)
    • Checks supported languages

      • chrome.exe (PID: 3808)
      • chrome.exe (PID: 3056)
      • chrome.exe (PID: 2092)
      • chrome.exe (PID: 3316)
      • chrome.exe (PID: 1392)
      • chrome.exe (PID: 3912)
      • iexplore.exe (PID: 2848)
      • iexplore.exe (PID: 2520)
      • chrome.exe (PID: 1180)
      • chrome.exe (PID: 704)
      • chrome.exe (PID: 4032)
      • chrome.exe (PID: 1376)
      • chrome.exe (PID: 2708)
      • chrome.exe (PID: 3308)
      • chrome.exe (PID: 2296)
      • chrome.exe (PID: 2264)
      • chrome.exe (PID: 4072)
      • chrome.exe (PID: 576)
      • chrome.exe (PID: 3016)
      • chrome.exe (PID: 3920)
      • chrome.exe (PID: 2564)
      • chrome.exe (PID: 3728)
      • chrome.exe (PID: 756)
      • chrome.exe (PID: 1248)
      • chrome.exe (PID: 2576)
      • chrome.exe (PID: 3596)
      • chrome.exe (PID: 2340)
      • chrome.exe (PID: 3744)
      • chrome.exe (PID: 3604)
      • chrome.exe (PID: 2988)
      • chrome.exe (PID: 1168)
      • chrome.exe (PID: 1016)
      • chrome.exe (PID: 4000)
      • chrome.exe (PID: 1236)
      • chrome.exe (PID: 3980)
      • chrome.exe (PID: 2548)
      • chrome.exe (PID: 3956)
      • chrome.exe (PID: 2844)
      • chrome.exe (PID: 3428)
      • chrome.exe (PID: 3016)
      • chrome.exe (PID: 1360)
      • chrome.exe (PID: 3952)
      • chrome.exe (PID: 2640)
      • chrome.exe (PID: 2700)
      • chrome.exe (PID: 2908)
      • chrome.exe (PID: 2240)
      • chrome.exe (PID: 892)
      • chrome.exe (PID: 124)
      • chrome.exe (PID: 1020)
      • chrome.exe (PID: 3228)
      • chrome.exe (PID: 3096)
      • chrome.exe (PID: 2640)
      • chrome.exe (PID: 2660)
      • chrome.exe (PID: 3528)
      • chrome.exe (PID: 3476)
      • chrome.exe (PID: 2480)
      • chrome.exe (PID: 2924)
      • chrome.exe (PID: 1072)
      • chrome.exe (PID: 704)
    • Reads the computer name

      • chrome.exe (PID: 1392)
      • iexplore.exe (PID: 2520)
      • iexplore.exe (PID: 2848)
      • chrome.exe (PID: 3912)
      • chrome.exe (PID: 3808)
      • chrome.exe (PID: 2576)
      • chrome.exe (PID: 2708)
      • chrome.exe (PID: 2988)
      • chrome.exe (PID: 1360)
      • chrome.exe (PID: 2640)
      • chrome.exe (PID: 3428)
    • Manual execution by user

      • chrome.exe (PID: 3912)
    • Changes internet zones settings

      • iexplore.exe (PID: 2520)
    • Application launched itself

      • iexplore.exe (PID: 2520)
      • chrome.exe (PID: 3912)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3808)
    • Reads the hosts file

      • chrome.exe (PID: 3912)
      • chrome.exe (PID: 3808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
94
Monitored processes
59
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe no specs iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2520"C:\Program Files\Internet Explorer\iexplore.exe" "https://turbobit.net/download/free/r93fceckitm6"C:\Program Files\Internet Explorer\iexplore.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2848"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2520 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
3912"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
Explorer.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
2092"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6f5cd988,0x6f5cd998,0x6f5cd9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
1392"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1032,2480668069239614406,1739415972861989344,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=988 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
3808"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1032,2480668069239614406,1739415972861989344,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1324 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
3056"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,2480668069239614406,1739415972861989344,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
3316"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,2480668069239614406,1739415972861989344,131072 --enable-features=PasswordImport --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
1180"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1032,2480668069239614406,1739415972861989344,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
704"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1032,2480668069239614406,1739415972861989344,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
Total events
14 949
Read events
14 721
Write events
219
Delete events
9

Modification events

(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30968311
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30968311
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2520) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
0
Suspicious files
250
Text files
183
Unknown types
23

Dropped files

PID
Process
Filename
Type
3912chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-62B95C7A-F48.pma
MD5:
SHA256:
2520iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFED6AE6BF4009BFCD.TMPgmc
MD5:A9772BBF5C8AED29F39AC18277686FF1
SHA256:8188F319633D8EB5453D5A5D9DF702BC0A13A16EFCD995862E889BB0C7F55701
2520iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFFD119528626F7481.TMPgmc
MD5:E572E8C216AB7BFA0EA1AD095CA433E4
SHA256:585804523F6A1D2167C9E357C0EA4A62C5C4A95DF12AEB780A213FF076104E3A
2520iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFD1A87D46C54DEF7A.TMPgmc
MD5:84AD4FEECF4760ABEFC75D87DDAD28AA
SHA256:8B7E16FC6107C074B5D957E8C366D803F87CCC64C0FB893700187A8A52601184
2520iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFE3A3E313B90B0FBF.TMPgmc
MD5:90A14A5379A64451D38CB920C9AE1B35
SHA256:A638151B22AAF472A689F36D0BF8D02A66D6AEC453BA072CA08A37B32FEF8116
2520iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{F18B2C2B-F5EA-11EC-AE3F-12A9866C77DE}.datbinary
MD5:3A76CF53D94CEA17B5F879657EBA7E78
SHA256:C8CA45917D2FEA826F2C4526CDB83A9D03A712F21C39AA31968E7CFAC092C13F
2520iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\{F18B2C2C-F5EA-11EC-AE3F-12A9866C77DE}.datbinary
MD5:D173CB6D1051C88EDAE6F6370A1F7038
SHA256:D7BAC96AE00B1A6CD1DC509B73DB70DF9D1F0E264147EA4EB43CFBFF77C2C6A3
2520iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\RecoveryStore.{42C873D0-1D90-11EB-BA2C-12A9866C77DE}.datbinary
MD5:F897932CC3FA3FF365A970AB8B42A457
SHA256:BE2FFDF6F8C977C68BFDA3F8CCA3795F7DDF19F4A9E7240E0B393FB5FD1523B4
2520iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{F18B2C29-F5EA-11EC-AE3F-12A9866C77DE}.datbinary
MD5:5D0B675D5F6FC0D0D2BE9FCAB96D8EBE
SHA256:BE2083FE31BB436EF45C7139BB4F7BC6F247C113443EC4C9CAEE91B80DCC4877
2092chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics.pmabinary
MD5:03C4F648043A88675A920425D824E1B3
SHA256:F91DBB7C64B4582F529C968C480D2DCE1C8727390482F31E4355A27BB3D9B450
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
79
TCP/UDP connections
171
DNS requests
99
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-content/themes/simone/style.css?ver=5.1.13
FR
text
8.72 Kb
suspicious
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-content/themes/simone/layouts/content-sidebar.css?ver=5.1.13
FR
text
694 b
suspicious
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/
FR
html
5.56 Kb
suspicious
3808
chrome.exe
GET
200
216.58.212.162:80
http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
US
text
55.1 Kb
whitelisted
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-content/plugins/popups/public/assets/js/public.js?ver=1.9.3.8
FR
text
8.64 Kb
suspicious
3808
chrome.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
crx
242 Kb
whitelisted
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
FR
text
3.92 Kb
suspicious
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-content/themes/simone/fonts/font-awesome/css/font-awesome.min.css?ver=5.1.13
FR
text
6.10 Kb
suspicious
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-content/plugins/popups/public/assets/css/public.css?ver=1.9.3.8
FR
text
1.50 Kb
suspicious
3808
chrome.exe
GET
200
46.105.98.67:80
http://metin2mod.tk/wp-includes/js/jquery/jquery.js?ver=1.12.4
FR
text
32.9 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3808
chrome.exe
142.250.185.163:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3808
chrome.exe
142.250.184.238:443
clients2.google.com
Google Inc.
US
whitelisted
142.250.185.163:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
142.250.185.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
142.250.186.100:443
www.google.com
Google Inc.
US
whitelisted
3808
chrome.exe
142.250.184.195:443
fonts.gstatic.com
Google Inc.
US
whitelisted
142.250.185.131:443
www.gstatic.com
Google Inc.
US
whitelisted
3808
chrome.exe
142.250.185.109:443
accounts.google.com
Google Inc.
US
suspicious
3808
chrome.exe
142.250.185.131:443
www.gstatic.com
Google Inc.
US
whitelisted
2848
iexplore.exe
5.45.76.184:443
turbobit.net
Serverius Holding B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
turbobit.net
  • 5.45.76.184
unknown
clientservices.googleapis.com
  • 142.250.185.163
whitelisted
accounts.google.com
  • 142.250.185.109
shared
clients2.google.com
  • 142.250.184.238
whitelisted
www.google.com
  • 142.250.186.100
whitelisted
fonts.googleapis.com
  • 142.250.185.106
  • 172.217.18.10
whitelisted
www.gstatic.com
  • 142.250.185.131
whitelisted
fonts.gstatic.com
  • 142.250.184.195
whitelisted
apis.google.com
  • 142.250.184.206
whitelisted
clients2.googleusercontent.com
  • 142.250.74.193
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a .tk domain - Likely Hostile
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
3808
chrome.exe
Potentially Bad Traffic
ET POLICY HTTP Request to a *.tk domain
No debug info