URL:

https://buzzheavier.com/

Full analysis: https://app.any.run/tasks/99838dab-fcb8-4ac7-8238-0fb553cce0a8
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: November 10, 2024, 11:53:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
hijackloader
loader
Indicators:
MD5:

2A66BE0E4A265615A07B0F8E4699E068

SHA1:

372EED597361DA7085ABA2B7C2C6EC5307A80364

SHA256:

BE183DA1EEA5526F67F6D40A103A15306F88F6583AC7AA6479279FB02B57D261

SSDEEP:

3:N8XETz:2XETz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • chrome.exe (PID: 6852)
    • HIJACKLOADER has been detected (YARA)

      • Setup.exe (PID: 5824)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 1952)
      • uc-browser-6-12909-1603.exe (PID: 7980)
    • Executable content was dropped or overwritten

      • Setup.exe (PID: 5824)
      • uc-browser-6-12909-1603.exe (PID: 7364)
      • setup.exe (PID: 8512)
      • installer.exe (PID: 7712)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 8132)
      • setup.exe (PID: 8512)
    • Process requests binary or script from the Internet

      • uc-browser-6-12909-1603.exe (PID: 7364)
    • Potential Corporate Privacy Violation

      • uc-browser-6-12909-1603.exe (PID: 7364)
    • Drops 7-zip archiver for unpacking

      • setup.exe (PID: 8512)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 8132)
    • Manual execution by a user

      • WinRAR.exe (PID: 1952)
    • Application launched itself

      • chrome.exe (PID: 1572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
275
Monitored processes
157
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs #PHISHING chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs rundll32.exe no specs winrar.exe no specs winrar.exe #HIJACKLOADER setup.exe uc-browser-6-12909-1603.exe no specs uc-browser-6-12909-1603.exe stats_uploader.exe conhost.exe no specs stats_uploader.exe conhost.exe no specs stats_uploader.exe conhost.exe no specs stats_uploader.exe conhost.exe no specs choice.exe no specs conhost.exe no specs stats_uploader.exe stats_uploader.exe conhost.exe no specs conhost.exe no specs chrome.exe no specs stats_uploader.exe stats_uploader.exe conhost.exe no specs conhost.exe no specs installer.exe stats_uploader.exe conhost.exe no specs stats_uploader.exe conhost.exe no specs setup.exe searchindexer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=44 --mojo-platform-channel-handle=6772 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoABAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=5372 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
608\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exestats_uploader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
692"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4904 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
848"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=63 --mojo-platform-channel-handle=6740 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
860"C:\Users\admin\AppData\Local\UCBrowser\Online_Downloader\stats_uploader.exe" --normal-stats1=https://i18nmmstat.ucweb.com/lv=1.0&encrypt_data=bTkwAnrdf3d2Lpt2FDfpivdhke+vqdvJSWxnDLDRLE8XUDUsNu6mXexG5KBaNd7b7L5FTUMANMB2pRQTwWebBcr+hbe4sGMckM6mu22ABopn1m1aJ+LYyDnwMb1KPCxy27eC6J8HWbQI518N0Vf6/HyNKNkv7lQ74Mjkp32ET3fgMrgn59Tw911gTYfHZVTp0irKlMpV43OlH51+FFPCLC9LYMt4vBCuznImhbqIqNCIOqkqtIKeTxAJGDrBOHxXNAFQxl5mwMCoH7kXNgll0US2vXT47ipcTfAk1qTfiUDoh2kMkIIz0OKD70gVYhyBTt5SuhFIp02VplCcpA==C:\Users\admin\AppData\Local\UCBrowser\Online_Downloader\stats_uploader.exe
uc-browser-6-12909-1603.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\ucbrowser\online_downloader\stats_uploader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
864"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3488 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
884"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6756 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1048"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=55 --mojo-platform-channel-handle=3772 --field-trial-handle=1924,i,5508566214911262679,6162635459477647112,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
27 361
Read events
27 217
Write events
116
Delete events
28

Modification events

(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1572) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1F
Value:
1
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1I
Value:
1
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C2I
Value:
1
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C7I
Value:
1
(PID) Process:(1572) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1S
Value:
1
Executable files
78
Suspicious files
408
Text files
468
Unknown types
1

Dropped files

PID
Process
Filename
Type
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF8e855.TMP
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF8e865.TMP
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF8e874.TMP
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF8e874.TMP
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF8e874.TMP
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
1572chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF8e874.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
59
TCP/UDP connections
583
DNS requests
707
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1768
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acritdxdihvo5tw7eapgm2gqtsza_2024.11.8.1/jflhchccmppkfebkiaminageehmchikm_2024.11.08.01_all_l7i2d3qv4wbibonherwf5rfpwy.crx3
unknown
whitelisted
1768
svchost.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkjdpjbpigfodbdjmbglcoo_2024.10.11.01_all_jzb2rltf4ebriiaz3nap6gmbai.crx3
unknown
whitelisted
1768
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acritdxdihvo5tw7eapgm2gqtsza_2024.11.8.1/jflhchccmppkfebkiaminageehmchikm_2024.11.08.01_all_l7i2d3qv4wbibonherwf5rfpwy.crx3
unknown
whitelisted
1768
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acritdxdihvo5tw7eapgm2gqtsza_2024.11.8.1/jflhchccmppkfebkiaminageehmchikm_2024.11.08.01_all_l7i2d3qv4wbibonherwf5rfpwy.crx3
unknown
whitelisted
1768
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acritdxdihvo5tw7eapgm2gqtsza_2024.11.8.1/jflhchccmppkfebkiaminageehmchikm_2024.11.08.01_all_l7i2d3qv4wbibonherwf5rfpwy.crx3
unknown
whitelisted
1768
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/cxxqn654fg7hzrcrrnqcniqqye_2024.10.11.1/kiabhabjdbkjdpjbpigfodbdjmbglcoo_2024.10.11.01_all_jzb2rltf4ebriiaz3nap6gmbai.crx3
unknown
whitelisted
1768
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkkcocmoeiminaijmmjnii_9.52.0_all_acwwpgcqveuj5szz3wkl52k5lm5a.crx3
unknown
whitelisted
1768
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ad3skwo2srs5xchyxzz6ujgnedha_9.52.0/gcmjkmgdlgnkkcocmoeiminaijmmjnii_9.52.0_all_acwwpgcqveuj5szz3wkl52k5lm5a.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
239.255.255.250:1900
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1572
chrome.exe
239.255.255.250:1900
whitelisted
6852
chrome.exe
104.26.5.225:443
buzzheavier.com
CLOUDFLARENET
US
unknown
6852
chrome.exe
142.250.110.84:443
accounts.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
buzzheavier.com
  • 104.26.5.225
  • 172.67.71.74
  • 104.26.4.225
  • 104.18.22.145
  • 104.18.23.145
unknown
accounts.google.com
  • 142.250.110.84
whitelisted
challenges.cloudflare.com
  • 104.18.94.41
  • 104.18.95.41
whitelisted
static.cloudflareinsights.com
  • 104.16.79.73
  • 104.16.80.73
whitelisted
www.google.com
  • 142.250.186.36
  • 142.250.185.132
  • 142.250.185.100
whitelisted
www.gstatic.com
  • 142.250.186.35
  • 142.250.185.99
  • 142.250.184.195
whitelisted

Threats

PID
Process
Class
Message
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare R2 Storage (r2 .cloudflarestorage .com)
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare R2 Storage (r2 .cloudflarestorage .com)
6852
chrome.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain by CrossDomain (transferbox .cfd)
6852
chrome.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain by CrossDomain (transferbox .cfd)
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] hCaptcha Enterprise Challenge
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] hCaptcha Enterprise Challenge
6852
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
1 ETPRO signatures available at the full report
Process
Message
uc-browser-6-12909-1603.exe
[7364:6904:1110/130013:WARNING:wow_install_downloader_proxy.cc(190)] clear temp download data
uc-browser-6-12909-1603.exe
[7364:8220:1110/130013:ERROR:wow_wmi_utils.cc(148)] Failed to initialize security. result = -2147417831
uc-browser-6-12909-1603.exe
[7364:6904:1110/130013:INFO:wow_stats_helper.cc(326)] https://i18nmmstat.ucweb.com/lv=1.0&encrypt_data=bTkwAgPEEJf/RQpWgyhY6ukz9y+dez0JIi5org8Pkrd3MWatGkHS3bnf/ArVraYy+d/pCpX7i4XK2RdjXZiQLlmxC7cbpOtNEfmXwdS1T+3Rm54So4dTDt+AWQxqz3/DQJLkPCg+C2FYrPHp7ykRCvq6PZ7zWyD757FjR2YMwkwlRPsgJ3eA+D8aq2O5B+zAvWQQx+wc2GrwZFqafaHR34x4h1M7t6EvDQ3ZevibTaYdQ05t59EEk8ZFvtNy/2JghnSn0j+EUIRwWnFd
uc-browser-6-12909-1603.exe
[7364:6904:1110/130013:INFO:wow_distribution_i18n.cc(487)] Got locale from UI language list.
uc-browser-6-12909-1603.exe
[7364:6904:1110/130013:INFO:wow_stats_helper.cc(322)] bluesky.1.2.3.1.1?cache=947008000&ka=&kb=2433f36584d9738cdbb9ee4d08b4f61a&kc=b7141b3680af7e1271d9562724bf707ev000000239b71be5&firstpid=4595&bid=35151&ver=6.1.3244.1000&installpid=4601&lang=en-US
uc-browser-6-12909-1603.exe
[7364:6904:1110/130013:INFO:wow_stats_helper.cc(326)] https://i18nmmstat.ucweb.com/lv=1.0&encrypt_data=bTkwAknEGZaBRf1XRShT7VUz5dEJey8L1CQZr18EeuJbPEGuck8w2dfJ4g0nttwgCtAhB3muiJ7f1Fo0KpbVPFK21a8w+LMU360wojTnrOVd3GkMOdjcAtyFr1ZtwYqnD8PaZFM7kciLoAn4VCyobxLrvKtdSPiNwbHqWF4NsSYQQhhXF2RQ55obC3YGCg7eQGj++lwXNyHIYiOtS7Z00RM3WF+sqGg6xQ2AGLebClteS3Fs54Af65hXIqLhq1dMDmacyvuPcv6Metsu85VvnRiYTRH2ZJAywJTgKctE8/8=
uc-browser-6-12909-1603.exe
[7364:6904:1110/130013:INFO:wow_stats_helper.cc(322)] bluesky.1.2.3.1.15?cache=947066000&ka=&kb=2433f36584d9738cdbb9ee4d08b4f61a&kc=b7141b3680af7e1271d9562724bf707ev000000239b71be5&firstpid=4595&bid=35151&ver=6.1.3244.1000&from=1&avproducts=Windows+Defender&lang=en-US
uc-browser-6-12909-1603.exe
[7364:6904:1110/130016:INFO:wow_stats_helper.cc(322)] bluesky.1.2.3.1.2?cache=950033000&ka=&kb=2433f36584d9738cdbb9ee4d08b4f61a&kc=b7141b3680af7e1271d9562724bf707ev000000239b71be5&firstpid=4595&bid=35151&ver=6.1.3244.1000&installpid=4601&lang=en-US
uc-browser-6-12909-1603.exe
[7364:6904:1110/130016:INFO:wow_stats_helper.cc(326)] https://i18nmmstat.ucweb.com/lv=1.0&encrypt_data=bTkwAg/GUd/LR7Uejy4bIsEPdb/1d7+ZBSitxvMF319HOGWNabLWPfUlt7IZs3naMctX2t3PDVVm196bgYpZNvmBE3e7tPONhevASXiD9FVJ9xQiK5vZPlv2ZGTWNSrb0IroXJgWdwHEhiKxQwdGciKeq65bP66Lu68Snzpu8wTlpMug51eQeGv4RKv14R+IVbiC1wTwKlqUQg8yAYsMd5xQ8zPL75WPAVdiAvTl4k4VN6A974WSY6orZ2tuzRuYZiSPEh90OEQEaAhi
uc-browser-6-12909-1603.exe
[7364:8164:1110/130016:INFO:wow_install_downloader_proxy.cc(407)] Config url: http://www.uc123.com/pcbrowser_i18n/downloader.php?pid=4601&version=1.0.0.0&os=win&arch=x86_64