URL:

https://vtsamples.commondatastorage.googleapis.com/7a6ceb6ace388bfb6c1698a723df98ec107e7043e955d64b03fba81cb65627db?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1690225636&Signature=dJywbNr3dJzVEzT6nIe91Lo7btBRsqqdaEqPOiala5wyCtFA%2F6OIfUJ202LRpaRfnsJvphpONFnw%0AExLTG2uB260PEpLWItZPFOSl5mO3KBzQqaNu%2BUVHQEOeQgFpqcVtlzfeR5mb5ZnMFVEJUJs3F%2Fba%0A%2FaJhjIU7bMAvNnsLwv19PBrboSWLr0dABoXQ%2BukTGqmj5NFcGWIMIQCPrJ%2BhtiEX26SRIUbgu%2BqA%0AXuvQ2Bk4Q1EJjmaOYosjopDeJXOzmYxS9ov0By1h3WgmZ72jCIai4VGRrlWxvUFS3YA%2FORfaz%2BGN%0AErra1z8e%2Brp%2BHoTSxzzoAdJ5pqSlONgHC%2Bc33Q%3D%3D&response-content-disposition=attachment%3B%20filename%3D%227a6ceb6ace388bfb6c1698a723df98ec107e7043e955d64b03fba81cb65627db%22&response-content-type=application%2Foctet-stream;

Full analysis: https://app.any.run/tasks/5cb9cdb1-d79c-480a-8d8c-c1938156b167
Verdict: Malicious activity
Threats:

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

Analysis date: July 24, 2023, 18:31:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
nanocore
darkcomet
Indicators:
MD5:

2CCB7277D40C165F73BB96965D6AC2F7

SHA1:

C5EFB97D6A871D071D68F08FD8038FBFC7DEE5F3

SHA256:

DDB053A8AEB979B03FEF0C0D5F8C192CEDB660432AEE143080005FD2F9DCEBB4

SSDEEP:

24:2h2Rx1pKlwIXprxOSzsemlXdiAj7LyiOSUy1ixAIe:vETSyekAj7Ly7G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • NEW STUB.EXE (PID: 1480)
      • msdcsc.exe (PID: 2424)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
      • NEW STUB.EXE (PID: 3236)
      • msdcsc.exe (PID: 1836)
    • Uses Task Scheduler to run other applications

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • msdcsc.exe (PID: 2424)
    • Changes the login/logoff helper path in the registry

      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
    • NANOCORE detected by memory dumps

      • NEW STUB.EXE (PID: 1480)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
    • Changes the autorun value in the registry

      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
    • Adds path to the Windows Defender exclusion list

      • Order Reqest Details 2023 Jbc.exe (PID: 600)
    • DARKCOMET detected by memory dumps

      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
    • Creates or modifies Windows services

      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
    • Changes Security Center notification settings

      • msdcsc.exe (PID: 1836)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • NEW STUB.EXE (PID: 1480)
    • Reads the Internet Settings

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
      • msdcsc.exe (PID: 2424)
    • Starts CMD.EXE for commands execution

      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
    • Application launched itself

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • msdcsc.exe (PID: 2424)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 2920)
      • cmd.exe (PID: 2872)
    • Start notepad (likely ransomware note)

      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
    • Connects to unusual port

      • NEW STUB.EXE (PID: 1480)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
    • Script adds exclusion path to Windows Defender

      • Order Reqest Details 2023 Jbc.exe (PID: 600)
    • Starts POWERSHELL.EXE for commands execution

      • Order Reqest Details 2023 Jbc.exe (PID: 600)
    • Starts itself from another location

      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
  • INFO

    • The process checks LSA protection

      • notepad++.exe (PID: 3972)
      • notepad++.exe (PID: 1616)
      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • NEW STUB.EXE (PID: 1480)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
      • NEW STUB.EXE (PID: 3236)
      • msdcsc.exe (PID: 2424)
      • msdcsc.exe (PID: 1836)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 2528)
      • chrome.exe (PID: 2068)
    • Manual execution by a user

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • notepad++.exe (PID: 3972)
      • WinRAR.exe (PID: 2528)
      • notepad++.exe (PID: 1616)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • taskmgr.exe (PID: 3272)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2528)
    • Application launched itself

      • chrome.exe (PID: 1532)
    • Checks supported languages

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • NEW STUB.EXE (PID: 1480)
      • msdcsc.exe (PID: 2424)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
      • NEW STUB.EXE (PID: 3236)
      • msdcsc.exe (PID: 1836)
    • Reads the computer name

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • NEW STUB.EXE (PID: 1480)
      • Order Reqest Details 2023 Jbc.exe (PID: 2948)
      • msdcsc.exe (PID: 2424)
      • NEW STUB.EXE (PID: 3236)
      • msdcsc.exe (PID: 1836)
    • Creates files or folders in the user directory

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • NEW STUB.EXE (PID: 1480)
    • Create files in a temporary directory

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • msdcsc.exe (PID: 2424)
    • Reads the machine GUID from the registry

      • Order Reqest Details 2023 Jbc.exe (PID: 2716)
      • NEW STUB.EXE (PID: 1480)
      • Order Reqest Details 2023 Jbc.exe (PID: 600)
      • Order Reqest Details 2023 Jbc.exe (PID: 3488)
      • NEW STUB.EXE (PID: 3236)
      • msdcsc.exe (PID: 2424)
    • Process checks are UAC notifies on

      • NEW STUB.EXE (PID: 1480)
    • Reads Environment values

      • NEW STUB.EXE (PID: 1480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Nanocore

(PID) Process(1480) NEW STUB.EXE
KeyboardLoggingTrue
BuildTime2021-04-18 18:21:52.193672
Version1.2.2.0
Mutex94803e62-45dd-47d9-9960-20dd767ecae3
DefaultGroupAPILA 2021
PrimaryConnectionHosttony3311.ddns.net
BackupConnectionHosttony3311.ddns.net
ConnectionPort10108
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlTrue
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
81
Monitored processes
34
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs notepad++.exe winrar.exe order reqest details 2023 jbc.exe notepad++.exe order reqest details 2023 jbc.exe schtasks.exe no specs order reqest details 2023 jbc.exe cmd.exe no specs cmd.exe no specs #NANOCORE new stub.exe attrib.exe no specs attrib.exe no specs notepad.exe no specs taskmgr.exe no specs msdcsc.exe no specs powershell.exe no specs powershell.exe no specs schtasks.exe no specs #NANOCORE order reqest details 2023 jbc.exe new stub.exe no specs notepad.exe no specs schtasks.exe no specs msdcsc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
556attrib "C:\Users\admin\Desktop\Order Reqest Details 2023 Jbc.exe" +s +hC:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
600"C:\Users\admin\Desktop\Order Reqest Details 2023 Jbc.exe" C:\Users\admin\Desktop\Order Reqest Details 2023 Jbc.exe
explorer.exe
User:
admin
Company:
Hewlett-Packard
Integrity Level:
HIGH
Description:
BeeTrial
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\order reqest details 2023 jbc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1480"C:\Users\admin\AppData\Local\Temp\NEW STUB.EXE" C:\Users\admin\AppData\Local\Temp\NEW STUB.EXE
Order Reqest Details 2023 Jbc.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\new stub.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Nanocore
(PID) Process(1480) NEW STUB.EXE
KeyboardLoggingTrue
BuildTime2021-04-18 18:21:52.193672
Version1.2.2.0
Mutex94803e62-45dd-47d9-9960-20dd767ecae3
DefaultGroupAPILA 2021
PrimaryConnectionHosttony3311.ddns.net
BackupConnectionHosttony3311.ddns.net
ConnectionPort10108
RunOnStartupTrue
RequestElevationFalse
BypassUserAccountControlFalse
ClearZoneIdentifierTrue
ClearAccessControlTrue
SetCriticalProcessFalse
PreventSystemSleepTrue
ActivateAwayModeFalse
EnableDebugModeFalse
RunDelay0
ConnectDelay4000
RestartDelay5000
TimeoutInterval5000
KeepAliveTimeout30000
MutexTimeout5000
LanTimeout2500
WanTimeout8000
BufferSize65535
MaxPacketSize10485760
GCThreshold10485760
UseCustomDnsServerTrue
PrimaryDnsServer8.8.8.8
BackupDnsServer8.8.4.4
1496"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DsgRewOasQTpD" /XML "C:\Users\admin\AppData\Local\Temp\tmpCC5.tmp"C:\Windows\System32\schtasks.exeOrder Reqest Details 2023 Jbc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
1532"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://vtsamples.commondatastorage.googleapis.com/7a6ceb6ace388bfb6c1698a723df98ec107e7043e955d64b03fba81cb65627db?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1690225636&Signature=dJywbNr3dJzVEzT6nIe91Lo7btBRsqqdaEqPOiala5wyCtFA%2F6OIfUJ202LRpaRfnsJvphpONFnw%0AExLTG2uB260PEpLWItZPFOSl5mO3KBzQqaNu%2BUVHQEOeQgFpqcVtlzfeR5mb5ZnMFVEJUJs3F%2Fba%0A%2FaJhjIU7bMAvNnsLwv19PBrboSWLr0dABoXQ%2BukTGqmj5NFcGWIMIQCPrJ%2BhtiEX26SRIUbgu%2BqA%0AXuvQ2Bk4Q1EJjmaOYosjopDeJXOzmYxS9ov0By1h3WgmZ72jCIai4VGRrlWxvUFS3YA%2FORfaz%2BGN%0AErra1z8e%2Brp%2BHoTSxzzoAdJ5pqSlONgHC%2Bc33Q%3D%3D&response-content-disposition=attachment%3B%20filename%3D%227a6ceb6ace388bfb6c1698a723df98ec107e7043e955d64b03fba81cb65627db%22&response-content-type=application%2Foctet-stream;"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1616"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\Order Reqest Details 2023 Jbc.exe"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
1836"C:\Users\admin\Documents\MSDCSC\msdcsc.exe"C:\Users\admin\Documents\MSDCSC\msdcsc.exemsdcsc.exe
User:
admin
Company:
Hewlett-Packard
Integrity Level:
MEDIUM
Description:
BeeTrial
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\documents\msdcsc\msdcsc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\ole32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2068"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3448 --field-trial-handle=1176,i,17033238403367282551,17601205735516064256,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
2180"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DsgRewOasQTpD" /XML "C:\Users\admin\AppData\Local\Temp\tmp76DE.tmp"C:\Windows\System32\schtasks.exeOrder Reqest Details 2023 Jbc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\schtasks.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2260"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1996 --field-trial-handle=1176,i,17033238403367282551,17601205735516064256,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
Total events
9 323
Read events
9 122
Write events
201
Delete events
0

Modification events

(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(1532) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(1532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
5
Suspicious files
27
Text files
48
Unknown types
0

Dropped files

PID
Process
Filename
Type
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF1096c3.TMP
MD5:
SHA256:
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:D5C9ECBD2DCA29D89266782824D7AF99
SHA256:D22D1243ACC064A30823180D0E583C853E9395367C78C2AD9DE59A463904F702
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old~RF10a77d.TMP
MD5:
SHA256:
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old
MD5:
SHA256:
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\802d4c7b-5e1d-45f2-beb0-b03fde4d4c56.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.oldtext
MD5:99EC94B2503FAD33EDAF99779EBA5BC8
SHA256:DC554AB7EDCAD375F39ED106CA1EF9A89FB8D9063A4D08F377F2C80D66799D7E
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF1096e3.TMPtext
MD5:CF083E99BB51786FA31BD0E0FE2686E4
SHA256:BC8DE81EFA52674CA26D55DFAFCBCE7A4D38994BEF5D267548EADF9985DBF5AC
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old~RF109906.TMPtext
MD5:BC40518EA72FFD659BC8B6229953BA1E
SHA256:D70541A4051FE732EB50C860796F6664731E6E6F67841FEB0D5DD7662BD603D3
1532chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF1096c3.TMPtext
MD5:C214500EDB0B5F56B9D3D27B32964AB2
SHA256:6254FD03CFC08A142D6AEB8C037D25D42564C0CC6F294A3716DF19FDF254EBCE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
167
DNS requests
32
Threats
11

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1084
svchost.exe
224.0.0.252:5355
unknown
1532
chrome.exe
224.0.0.251:5353
unknown
3340
chrome.exe
142.250.185.164:443
www.google.com
whitelisted
3340
chrome.exe
216.58.206.46:443
sb-ssl.google.com
GOOGLE
US
whitelisted
3340
chrome.exe
142.250.186.106:443
optimizationguide-pa.googleapis.com
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3340
chrome.exe
172.217.18.106:443
optimizationguide-pa.googleapis.com
GOOGLE
US
whitelisted
3340
chrome.exe
142.250.186.138:443
www.googleapis.com
GOOGLE
US
whitelisted
3340
chrome.exe
142.250.185.163:443
update.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
vtsamples.commondatastorage.googleapis.com
  • 216.58.206.48
whitelisted
accounts.google.com
  • 142.250.184.205
shared
sb-ssl.google.com
  • 216.58.206.46
whitelisted
www.google.com
  • 142.250.185.164
malicious
optimizationguide-pa.googleapis.com
  • 142.250.186.106
  • 172.217.18.106
  • 142.250.185.138
  • 142.250.181.234
  • 142.250.185.74
  • 216.58.212.170
  • 142.250.185.202
  • 142.250.185.106
  • 142.250.185.170
  • 216.58.212.138
  • 142.250.184.202
  • 172.217.16.138
  • 216.58.206.42
  • 142.250.186.74
  • 172.217.23.106
  • 142.250.185.234
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
www.googleapis.com
  • 172.217.16.138
  • 142.250.186.138
  • 142.250.185.202
  • 142.250.186.74
  • 142.250.185.106
  • 142.250.185.170
  • 142.250.184.202
  • 142.250.185.74
  • 142.250.74.202
  • 142.250.185.138
  • 172.217.18.106
  • 142.250.181.234
  • 142.250.186.42
  • 142.250.186.106
  • 142.250.184.234
  • 142.250.185.234
whitelisted
update.googleapis.com
  • 142.250.185.163
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
clients1.google.com
  • 142.250.74.206
whitelisted

Threats

PID
Process
Class
Message
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1084
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1480
NEW STUB.EXE
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
1084
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\plugins\Config\nppPluginList.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe