URL:

https://navyquicklinks.com

Full analysis: https://app.any.run/tasks/387f45c3-2e10-4671-a25c-7d7979ff5ff0
Verdict: Malicious activity
Analysis date: December 10, 2024, 05:59:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MD5:

0F64A13927F0254A207C27A27E81D2C2

SHA1:

58694D90A9FC6216A383D24610F54AA48D1F68AC

SHA256:

7F78763F9707A53881B7353C449A71ADB008AD83A7F8BC4180CB10908E4A2D5A

SSDEEP:

3:N8dU47LOqIn:237LrIn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3888)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3888)
    • Application launched itself

      • GuardMate.exe (PID: 5320)
      • GuardMate.exe (PID: 848)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 6236)
    • The process uses the downloaded file

      • chrome.exe (PID: 4804)
      • chrome.exe (PID: 6236)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 4980)
      • OpenWith.exe (PID: 712)
      • OpenWith.exe (PID: 5208)
    • Manual execution by a user

      • WinRAR.exe (PID: 3888)
      • GuardMate.exe (PID: 848)
    • Creates files or folders in the user directory

      • GuardMate.exe (PID: 848)
      • GuardMate.exe (PID: 1304)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3888)
      • chrome.exe (PID: 372)
    • Checks supported languages

      • GuardMate.exe (PID: 848)
      • GuardMate.exe (PID: 1304)
      • GuardMate.exe (PID: 1356)
      • GuardMate.exe (PID: 7160)
      • GuardMate.exe (PID: 5200)
      • GuardMate.exe (PID: 1292)
      • GuardMate.exe (PID: 7092)
      • GuardMate.exe (PID: 7164)
    • Sends debugging messages

      • GuardMate.exe (PID: 5320)
    • Reads the computer name

      • GuardMate.exe (PID: 1304)
      • GuardMate.exe (PID: 7164)
      • GuardMate.exe (PID: 2680)
    • Reads the machine GUID from the registry

      • GuardMate.exe (PID: 848)
    • Process checks computer location settings

      • GuardMate.exe (PID: 7092)
    • Checks proxy server information

      • GuardMate.exe (PID: 848)
    • Create files in a temporary directory

      • GuardMate.exe (PID: 848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
180
Monitored processes
41
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs openwith.exe no specs openwith.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs rundll32.exe no specs openwith.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs guardmate.exe guardmate.exe guardmate.exe no specs guardmate.exe no specs guardmate.exe guardmate.exe no specs guardmate.exe no specs guardmate.exe no specs chrome.exe guardmate.exe no specs chrome.exe no specs guardmate.exe no specs guardmate.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
372"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2776 --field-trial-handle=1932,i,11895521046981923677,14819325029725695324,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
712C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
712"C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\GuardMate\User Data" --nwapp-path="C:\Users\admin\Downloads\GuardMate\AppData\GuardMate" --field-trial-handle=4584,i,9982807660785991766,6110351918534621686,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:8C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exeGuardMate.exe
User:
admin
Company:
The NW.js Community
Integrity Level:
HIGH
Description:
nwjs
Exit code:
0
Version:
0.90.1
Modules
Images
c:\users\admin\downloads\guardmate\appdata\guardmate\guardmate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\downloads\guardmate\appdata\guardmate\nw_elf.dll
848"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3476 --field-trial-handle=1932,i,11895521046981923677,14819325029725695324,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
848"C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe" C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe
explorer.exe
User:
admin
Company:
The NW.js Community
Integrity Level:
HIGH
Description:
nwjs
Version:
0.90.1
Modules
Images
c:\users\admin\downloads\guardmate\appdata\guardmate\guardmate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\downloads\guardmate\appdata\guardmate\nw_elf.dll
880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4476 --field-trial-handle=1932,i,11895521046981923677,14819325029725695324,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1292"C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Local\GuardMate\User Data" --nwapp-path="C:\Users\admin\Downloads\GuardMate\AppData\GuardMate" --nwjs --extension-process --no-sandbox --file-url-path-alias="/gen=C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\gen" --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --js-flags=--expose-gc --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2876,i,9982807660785991766,6110351918534621686,262144 --variations-seed-version --mojo-platform-channel-handle=2892 /prefetch:2C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exeGuardMate.exe
User:
admin
Company:
The NW.js Community
Integrity Level:
HIGH
Description:
nwjs
Version:
0.90.1
Modules
Images
c:\users\admin\downloads\guardmate\appdata\guardmate\guardmate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\downloads\guardmate\appdata\guardmate\nw_elf.dll
1304"C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\GuardMate\User Data" --nwapp-path="C:\Users\admin\Downloads\GuardMate\AppData\GuardMate" --field-trial-handle=2064,i,9982807660785991766,6110351918534621686,262144 --variations-seed-version --mojo-platform-channel-handle=2080 /prefetch:3C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe
GuardMate.exe
User:
admin
Company:
The NW.js Community
Integrity Level:
HIGH
Description:
nwjs
Version:
0.90.1
Modules
Images
c:\users\admin\downloads\guardmate\appdata\guardmate\guardmate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\users\admin\downloads\guardmate\appdata\guardmate\nw_elf.dll
1348"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3568 --field-trial-handle=1932,i,11895521046981923677,14819325029725695324,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1356"C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exe" --type=gpu-process --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\GuardMate\User Data" --nwapp-path="C:\Users\admin\Downloads\GuardMate\AppData\GuardMate" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,9982807660785991766,6110351918534621686,262144 --variations-seed-version --mojo-platform-channel-handle=1900 /prefetch:2C:\Users\admin\Downloads\GuardMate\AppData\GuardMate\GuardMate.exeGuardMate.exe
User:
admin
Company:
The NW.js Community
Integrity Level:
HIGH
Description:
nwjs
Version:
0.90.1
Modules
Images
c:\users\admin\downloads\guardmate\appdata\guardmate\guardmate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\version.dll
Total events
16 651
Read events
16 491
Write events
135
Delete events
25

Modification events

(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6236) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(4804) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
010000000000000098E254DCC84ADB01
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1I
Value:
1
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C2I
Value:
1
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C7I
Value:
1
(PID) Process:(6236) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1S
Value:
1
Executable files
23
Suspicious files
1 569
Text files
286
Unknown types
213

Dropped files

PID
Process
Filename
Type
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF136b7f.TMP
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF136b7f.TMP
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF136b9e.TMP
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF136bae.TMP
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF136bae.TMP
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
6236chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
36
TCP/UDP connections
121
DNS requests
139
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2324
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1020
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppeemjhbpbandiljpe_67_win_kfegpqlp6gezs4ree2ol2br2ym.crx3
unknown
whitelisted
2324
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4876
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1020
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppeemjhbpbandiljpe_67_win_kfegpqlp6gezs4ree2ol2br2ym.crx3
unknown
whitelisted
1020
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ac6mhlwypzipnufijdvfyhdgvt4q_67/khaoiebndkojlmppeemjhbpbandiljpe_67_win_kfegpqlp6gezs4ree2ol2br2ym.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5004
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.16.204.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6568
chrome.exe
77.247.182.244:443
navyquicklinks.com
NForce Entertainment B.V.
NL
unknown
6236
chrome.exe
239.255.255.250:1900
whitelisted
6568
chrome.exe
108.177.15.84:443
accounts.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.16.204.155
  • 2.16.204.137
  • 2.16.204.135
  • 2.16.204.160
  • 2.16.204.136
  • 2.16.204.157
  • 2.16.204.159
  • 2.16.204.153
  • 2.16.204.156
  • 2.23.209.148
  • 2.23.209.150
  • 2.23.209.149
  • 2.23.209.143
  • 2.23.209.137
  • 2.23.209.140
  • 2.23.209.141
  • 2.23.209.144
  • 2.23.209.135
  • 2.23.209.131
  • 2.23.209.193
  • 2.23.209.187
  • 2.23.209.189
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
navyquicklinks.com
  • 77.247.182.244
unknown
accounts.google.com
  • 108.177.15.84
whitelisted
andoree.com
  • 172.67.136.85
  • 104.21.80.249
unknown
cint.guardmate.cc
  • 206.189.225.178
unknown

Threats

PID
Process
Class
Message
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6568
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
Process
Message
GuardMate.exe
[1210/060422.371:ERROR:filesystem_win.cc(128)] GetFileAttributes C:\Users\admin\AppData\Local\GuardMate\User Data\Crashpad\attachments\885724d9-f286-4f35-9807-fc35f2d2880a: The system cannot find the file specified. (0x2)
GuardMate.exe
[1210/060422.377:ERROR:filesystem_win.cc(128)] GetFileAttributes C:\Users\admin\AppData\Local\GuardMate\User Data\Crashpad\attachments\885724d9-f286-4f35-9807-fc35f2d2880a: The system cannot find the file specified. (0x2)
GuardMate.exe
[1210/060422.377:ERROR:filesystem_win.cc(128)] GetFileAttributes C:\Users\admin\AppData\Local\GuardMate\User Data\Crashpad\attachments\885724d9-f286-4f35-9807-fc35f2d2880a: The system cannot find the file specified. (0x2)