File name:

Oden_PO2339.exe

Full analysis: https://app.any.run/tasks/360448a1-5786-42b3-a8f8-d21c889eb05f
Verdict: Malicious activity
Analysis date: December 21, 2023, 07:49:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
warzone
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7CE47DEE0EF61A16D0811FBE451E02F2

SHA1:

3C7271B7AB2E80EF40BE568D7CD4C36A2212EC64

SHA256:

D2D549D6DD5D017CE1B853932513EC389DE11E6443FE466487B2ED2E1528B857

SSDEEP:

49152:waeK3eJrsU//aUEORYXfXaIGoMT1QFt5NBcQMvyM88TJuHK8WMxeitSexEsat7OZ:waeKyN/aUEvXfXPt4ytPou8oHK8TIith

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Oden_PO2339.exe (PID: 2544)
      • zxfvzxvr.exe (PID: 388)
      • drgsfszs.sfx.exe (PID: 2444)
      • drgsfszs.exe (PID: 2148)
      • zxfvzxvr.sfx.exe (PID: 1792)
    • WARZONE has been detected (YARA)

      • mimages.exe (PID: 2044)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Oden_PO2339.exe (PID: 2544)
      • zxfvzxvr.exe (PID: 388)
      • drgsfszs.sfx.exe (PID: 2444)
      • zxfvzxvr.sfx.exe (PID: 1792)
    • Executing commands from a ".bat" file

      • zxfvzxvr.exe (PID: 388)
    • Starts CMD.EXE for commands execution

      • zxfvzxvr.exe (PID: 388)
      • Oden_PO2339.exe (PID: 2544)
    • Connects to unusual port

      • mimages.exe (PID: 2044)
    • Executing commands from ".cmd" file

      • Oden_PO2339.exe (PID: 2544)
  • INFO

    • Checks supported languages

      • Oden_PO2339.exe (PID: 2544)
      • drgsfszs.sfx.exe (PID: 2444)
      • drgsfszs.exe (PID: 2148)
      • drgsfszs.exe (PID: 1504)
      • mimages.exe (PID: 2044)
      • mimages.exe (PID: 3000)
      • zxfvzxvr.sfx.exe (PID: 1792)
      • zxfvzxvr.exe (PID: 388)
    • Reads the computer name

      • Oden_PO2339.exe (PID: 2544)
      • zxfvzxvr.sfx.exe (PID: 1792)
      • zxfvzxvr.exe (PID: 388)
      • drgsfszs.sfx.exe (PID: 2444)
      • drgsfszs.exe (PID: 1504)
      • drgsfszs.exe (PID: 2148)
      • mimages.exe (PID: 3000)
      • mimages.exe (PID: 2044)
    • Creates files or folders in the user directory

      • Oden_PO2339.exe (PID: 2544)
      • zxfvzxvr.sfx.exe (PID: 1792)
      • drgsfszs.exe (PID: 2148)
    • Application launched itself

      • chrome.exe (PID: 2996)
      • drgsfszs.exe (PID: 1504)
      • mimages.exe (PID: 3000)
    • The executable file from the user directory is run by the CMD process

      • zxfvzxvr.sfx.exe (PID: 1792)
      • drgsfszs.sfx.exe (PID: 2444)
    • Starts itself from another location

      • zxfvzxvr.sfx.exe (PID: 1792)
      • drgsfszs.exe (PID: 2148)
    • Create files in a temporary directory

      • zxfvzxvr.exe (PID: 388)
      • drgsfszs.sfx.exe (PID: 2444)
    • Reads the machine GUID from the registry

      • drgsfszs.exe (PID: 1504)
      • mimages.exe (PID: 3000)
    • The process uses the downloaded file

      • chrome.exe (PID: 2484)
      • chrome.exe (PID: 2800)
      • chrome.exe (PID: 388)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 2472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

WarZone

(PID) Process(2044) mimages.exe
C2 (1)glotreobmoenry.sytes.net:5210
BuildIDT37PC1JH48
Options
Install FlagTrue
Install namemimages.exe
Startup FlagTrue
Startup nameMImages
Reverse Proxy local port5000
Offline logFalse
PersistanceFalse
UAC bypassFalse
Defender bypassFalse
Use ADSFalse
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:04:27 22:03:27+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 190976
InitializedDataSize: 71680
UninitializedDataSize: -
EntryPoint: 0x1d759
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
70
Monitored processes
35
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start oden_po2339.exe no specs cmd.exe no specs chrome.exe chrome.exe no specs zxfvzxvr.sfx.exe no specs zxfvzxvr.exe no specs cmd.exe no specs chrome.exe no specs chrome.exe drgsfszs.sfx.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs drgsfszs.exe no specs chrome.exe no specs drgsfszs.exe drgsfszs.exe no specs mimages.exe no specs mimages.exe #WARZONE mimages.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs software_reporter_tool.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
388"C:\Users\admin\AppData\Roaming\zxfvzxvr.exe" C:\Users\admin\AppData\Roaming\zxfvzxvr.exezxfvzxvr.sfx.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\zxfvzxvr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
388"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3624 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:8C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
756"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1328 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:2C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1096"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:2C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1100"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2136 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:1C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1368"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3512 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:8C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1488"C:\Users\admin\AppData\Local\Google\Chrome\User Data\SwReporter\112.300.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=B2i5awYBScXxNpEhuXJb+MuwnTKPHuJgt0ttZqME --registry-suffix=ESETC:\Users\admin\AppData\Local\Google\Chrome\User Data\SwReporter\112.300.200\software_reporter_tool.exechrome.exe
User:
admin
Company:
Google
Integrity Level:
MEDIUM
Description:
Software Reporter Tool
Exit code:
3221225785
Version:
112.300.200
Modules
Images
c:\users\admin\appdata\local\google\chrome\user data\swreporter\112.300.200\software_reporter_tool.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1504"C:\Users\admin\AppData\Local\Temp\drgsfszs.exe" C:\Users\admin\AppData\Local\Temp\drgsfszs.exedrgsfszs.sfx.exe
User:
admin
Company:
Vopth View Vitch
Integrity Level:
MEDIUM
Description:
Vopth View
Exit code:
0
Version:
9.8.8.8
Modules
Images
c:\users\admin\appdata\local\temp\drgsfszs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
1644"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=3696 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:8C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1644"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3720 --field-trial-handle=1248,i,1687315606856097483,14012608080577865884,131072 /prefetch:1C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
6 756
Read events
6 628
Write events
127
Delete events
1

Modification events

(PID) Process:(2544) Oden_PO2339.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2544) Oden_PO2339.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2544) Oden_PO2339.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2544) Oden_PO2339.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2996) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1792) zxfvzxvr.sfx.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1792) zxfvzxvr.sfx.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
9
Suspicious files
114
Text files
29
Unknown types
0

Dropped files

PID
Process
Filename
Type
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF108280.TMP
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C7925A6B262C5676D1C36638981A6EA
SHA256:07F6FB1E9CBCE4D15C00A9FBF9A95C1F31DE20C4C48B433198862E8759CD128D
2544Oden_PO2339.exeC:\Users\admin\AppData\Roaming\zxfvzxvr.sfx.exeexecutable
MD5:2ED7448479CC04EB63F750814199AE6F
SHA256:74BD13647CE1BC6B000510E88DC437403AD83483F9A12757F980B2D98170967F
2544Oden_PO2339.exeC:\Users\admin\AppData\Roaming\kubSample.webpimage
MD5:550C8AD1E9FA820795B6087624C05BD4
SHA256:520F8F4599399887EAA61010D27F48036611F1D4410D199E929BB4B6D9ACB9AC
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RF1083a9.TMPtext
MD5:83DFA02A36C9307E698CB66E868BF1B6
SHA256:
2996chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:9F941EA08DBDCA2EB3CFA1DBBBA6F5DC
SHA256:127F71DF0D2AD895D4F293E62284D85971AE047CA15F90B87BF6335898B0B655
2544Oden_PO2339.exeC:\Users\admin\AppData\Roaming\hycxhxtr.cmdtext
MD5:29E365C43A5C339CF02E30A520EDAC31
SHA256:347AE171E7BD0F8AAC406AD585C241FA76E54FEC61CD6DB92F5071108ECE58EB
388zxfvzxvr.exeC:\Users\admin\AppData\Local\Temp\hjbhsfhxtr.battext
MD5:3F149C4F4A1996114DA1D147B7CD5989
SHA256:595DCFB1DF46752EA2F0BE4B75E2770397BFEF329D19E2D471871BDC6D5A74BC
1792zxfvzxvr.sfx.exeC:\Users\admin\AppData\Roaming\zxfvzxvr.exeexecutable
MD5:2A0C5B7AF46C1EA79907CD7957C4779C
SHA256:F1B234DA3066573E18CE57C1DEE3B4B4DFA3D152268FC5544D9F5CC0F52F17E2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
45
DNS requests
50
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
864
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
10.1 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
5.64 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
9.88 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
10.0 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
44.5 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
21.4 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
90.5 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
181 Kb
unknown
864
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/ncrr3jrkc3nerq4tdp7lehlppe_112.300.200/gkmgaooipdjhmangpemjhigmamcehddo_112.300.200_win64_nrpvirsu5aw3cszevrlqbmhv34.crx3
unknown
binary
342 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1220
svchost.exe
239.255.255.250:3702
whitelisted
352
svchost.exe
224.0.0.252:5355
unknown
2136
chrome.exe
172.217.23.99:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
2996
chrome.exe
239.255.255.250:1900
whitelisted
2136
chrome.exe
173.194.76.84:443
accounts.google.com
GOOGLE
US
whitelisted
2996
chrome.exe
224.0.0.251:5353
unknown
2136
chrome.exe
142.250.186.67:443
update.googleapis.com
GOOGLE
US
whitelisted
2044
mimages.exe
91.92.252.239:5210
glotreobmoenry.sytes.net
BG
malicious
2136
chrome.exe
142.250.185.170:443
optimizationguide-pa.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.23.99
whitelisted
accounts.google.com
  • 173.194.76.84
shared
update.googleapis.com
  • 142.250.186.67
whitelisted
glotreobmoenry.sytes.net
  • 91.92.252.239
unknown
optimizationguide-pa.googleapis.com
  • 142.250.185.170
  • 142.250.185.202
  • 142.250.185.234
  • 142.250.186.74
  • 142.250.186.106
  • 142.250.181.234
  • 172.217.16.138
  • 142.250.184.202
  • 142.250.184.234
  • 142.250.186.138
  • 142.250.186.42
  • 172.217.18.10
  • 172.217.16.202
  • 142.250.186.170
  • 216.58.206.42
  • 172.217.18.106
whitelisted
www.googleapis.com
  • 216.58.212.138
  • 142.250.185.74
  • 142.250.185.106
  • 142.250.185.138
  • 142.250.185.170
  • 142.250.185.202
  • 142.250.185.234
  • 142.250.186.74
  • 142.250.186.106
  • 142.250.181.234
  • 172.217.16.138
  • 142.250.184.202
  • 142.250.184.234
  • 142.250.186.138
  • 142.250.74.202
  • 142.250.186.42
whitelisted
support.google.com
  • 142.250.186.78
whitelisted
safebrowsing.googleapis.com
  • 172.217.16.138
whitelisted
fonts.googleapis.com
  • 142.250.186.170
whitelisted
www.google-analytics.com
  • 142.250.184.206
whitelisted

Threats

PID
Process
Class
Message
352
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.sytes.net Domain
352
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.sytes.net Domain
No debug info