download:

john-1.9.0-jumbo-1-win64.7z

Full analysis: https://app.any.run/tasks/397a13fc-6a41-43f4-a4de-ff214a81cf8e
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 04, 2020, 02:08:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

2AAEAD3288E0376DE1E24F8A02A29C79

SHA1:

AFA993C870ABCD9E74213DD40B1CE59299DB9FDD

SHA256:

CE05A898B72BB30C3C4F703E3FFCF25966C1B1801EB7E095030B44092EF92EAF

SSDEEP:

393216:fbkNy8lMtmO+s5P55fzDpRRCIb978Rq1QYQxZsiLGZnets2:fYTlmH+sd/fzpCwz1QYQxOhCs2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Detects Cygwin installation

      • WinRAR.exe (PID: 620)
    • Dropped file may contain instructions of ransomware

      • WinRAR.exe (PID: 620)
  • SUSPICIOUS

    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2524)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 620)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2640)
      • chrome.exe (PID: 2524)
    • Manual execution by user

      • chrome.exe (PID: 2524)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2524)
    • Application launched itself

      • chrome.exe (PID: 2524)
    • Reads settings of System Certificates

      • chrome.exe (PID: 2640)
    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 620)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
85
Monitored processes
43
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
340"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=15004789663327467532 --mojo-platform-channel-handle=3660 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
564"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12687496653908431446 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
620"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64.7z"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
956"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=1702502259796945171 --mojo-platform-channel-handle=4044 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1136"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=12223806515897352644 --mojo-platform-channel-handle=3756 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1168"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=12127807836379467283 --mojo-platform-channel-handle=4052 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1296"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4158622001999822213 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2556 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1564"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14775423683295125674 --mojo-platform-channel-handle=3820 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1636"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=12745956502163665404 --mojo-platform-channel-handle=2428 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,2759046072815684721,10216100508906255829,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=842072994827362023 --mojo-platform-channel-handle=3860 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
1 522
Read events
1 398
Write events
119
Delete events
5

Modification events

(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(620) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64.7z
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64
(PID) Process:(620) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:1
Value:
C:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64
Executable files
90
Suspicious files
113
Text files
1 082
Unknown types
8

Dropped files

PID
Process
Filename
Type
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\Auditing-Openfire.mdtext
MD5:120BA6CBD3DAB6B0AE095E6F6A2B09C5
SHA256:E17302E7CDB38D07E5FAE8BD0DD6F31F946EBDAC842F4797793314F9614122D6
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\AxCrypt-Auditing-HOWTO.mdtext
MD5:4158BF58096EE370BDCD32E9FEA4CB8F
SHA256:7CABE81FC2B700A3250FFD86754772410C3161222BAE1E3BD8907512A88899EA
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\README.mdtext
MD5:A78569B8241932F90FDE66C9B969191E
SHA256:05595731CB6B21D3EFCE02ABCDF912945219ED7580FCA37EB17F012808D33464
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\CREDITS-jumbo.txttext
MD5:4E6A9F4E2CB61E036771FCFD62586D9C
SHA256:91C7C0BC37F41656F80AD077BE13903677F0E0CA7594878D6EE7E2C62B34D4E9
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\CONFIG.txttext
MD5:415F0C5E7371A381DA11F0BCB7EC1031
SHA256:57EFEBDE8FF2447526661F9949CA32C4161DE46C74629302B39DEAC87E7D690C
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\CRAM-MD5.txttext
MD5:70738AE8B003C2E2E87122278DC5E24F
SHA256:F8D32A0C093257659012803994C374E75D93A9A1BABA204A7C381AE3CFD107C1
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\EXTERNAL.txttext
MD5:1A25215DFEB11AEBDB68A0BAB20E2D21
SHA256:D27550954EF041E8090DEFF9B0842C43B6B5423F6913BC4A936A9CC8CF24031A
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\Auditing-Kerio-Connect.mdtext
MD5:4F10C8D732316BC578C548CF6C8F85DB
SHA256:8F410C31C213E80E2EE5123AE524B8EB82C1F66DC2CF3B836CC09BF2EF4D2C71
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\COPYING.txttext
MD5:FFA10F40B98BE2C2BC9608F56827ED23
SHA256:189B1AF95D661151E054CEA10C91B3D754E4DE4D3FECFB074C1FB29476F7167B
620WinRAR.exeC:\Users\admin\AppData\Local\Temp\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\doc\CHANGES-jumbo.txttext
MD5:76054CB49002CA3AB0439F926D7F29A5
SHA256:15086B6B8D309E173DD36B5938C6AFC80DF27A1626D2A998A1773B1D1F87F9C9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
60
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2640
chrome.exe
GET
302
172.217.23.174:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
517 b
whitelisted
2640
chrome.exe
GET
302
172.217.23.174:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
522 b
whitelisted
2640
chrome.exe
GET
200
74.125.104.104:80
http://r2---sn-2gb7sn7k.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mh=bs&mip=84.17.36.75&mm=28&mn=sn-2gb7sn7k&ms=nvh&mt=1585966154&mv=m&mvi=1&pl=24&shardbypass=yes
US
crx
862 Kb
whitelisted
2640
chrome.exe
GET
200
173.194.150.231:80
http://r1---sn-2gb7sn7s.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mh=QJ&mip=84.17.36.75&mm=28&mn=sn-2gb7sn7s&ms=nvh&mt=1585966154&mv=m&mvi=0&pl=24&shardbypass=yes
US
crx
293 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2640
chrome.exe
172.217.22.35:443
www.google.com.ua
Google Inc.
US
whitelisted
2640
chrome.exe
216.58.210.10:443
fonts.googleapis.com
Google Inc.
US
whitelisted
2640
chrome.exe
172.217.16.141:443
accounts.google.com
Google Inc.
US
suspicious
2640
chrome.exe
216.58.206.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2640
chrome.exe
172.217.23.174:80
redirector.gvt1.com
Google Inc.
US
whitelisted
2640
chrome.exe
216.58.207.78:443
clients2.google.com
Google Inc.
US
whitelisted
2640
chrome.exe
173.194.150.231:80
r1---sn-2gb7sn7s.gvt1.com
Google Inc.
US
whitelisted
2640
chrome.exe
74.125.104.104:80
r2---sn-2gb7sn7k.gvt1.com
Google Inc.
US
whitelisted
2640
chrome.exe
172.217.22.36:443
www.google.com
Google Inc.
US
whitelisted
2640
chrome.exe
172.217.23.99:443
www.google.co.uk
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 216.58.206.3
whitelisted
accounts.google.com
  • 172.217.16.141
shared
www.google.com.ua
  • 172.217.22.35
whitelisted
fonts.googleapis.com
  • 216.58.210.10
whitelisted
www.gstatic.com
  • 172.217.22.3
whitelisted
fonts.gstatic.com
  • 172.217.23.131
whitelisted
apis.google.com
  • 172.217.21.206
whitelisted
ogs.google.com.ua
  • 172.217.16.206
whitelisted
clients2.google.com
  • 216.58.207.78
whitelisted
redirector.gvt1.com
  • 172.217.23.174
whitelisted

Threats

No threats detected
No debug info