URL:

https://anonfile.com/VbIe41e2o4/Netflix_Account_Generator_exe

Full analysis: https://app.any.run/tasks/e5425a20-36b9-4ce2-b84a-0b489e755f54
Verdict: Malicious activity
Threats:

Hawkeye often gets installed in a bundle with other malware. This is a Trojan and keylogger that is used to retrieve private information such as passwords and login credentials. This is an advanced malware that features strong anti-evasion functions.

Analysis date: March 05, 2020, 10:35:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
evasion
keylogger
hawkeye
trojan
Indicators:
MD5:

F1BA4D1CBA1915AA7EF0F93163290977

SHA1:

D40E245DDF3C9EC320C72744521EBAD15EDF04D5

SHA256:

F41ED02CD9DEF3BD35FEC54CE4391DC4D4103E3DBD6141DD3A06AEB0D29C66A8

SSDEEP:

3:N8RGOstAdFPGG/ROubCn:2gDydBNMuen

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Netflix Account Generator.exe (PID: 3820)
      • lawnmower.exe (PID: 3672)
    • HAWKEYE was detected

      • lawnmower.exe (PID: 3672)
    • Actions looks like stealing of personal data

      • vbc.exe (PID: 3096)
    • Downloads executable files from the Internet

      • chrome.exe (PID: 1392)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 3272)
      • Netflix Account Generator.exe (PID: 3820)
      • chrome.exe (PID: 1392)
    • Creates files in the user directory

      • Netflix Account Generator.exe (PID: 3820)
      • lawnmower.exe (PID: 3672)
    • Checks for external IP

      • lawnmower.exe (PID: 3672)
    • Executes scripts

      • lawnmower.exe (PID: 3672)
    • Loads DLL from Mozilla Firefox

      • vbc.exe (PID: 2308)
    • Connects to SMTP port

      • lawnmower.exe (PID: 3672)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3272)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 3272)
      • chrome.exe (PID: 1392)
    • Application launched itself

      • chrome.exe (PID: 3272)
    • Reads settings of System Certificates

      • chrome.exe (PID: 1392)
      • chrome.exe (PID: 3272)
      • lawnmower.exe (PID: 3672)
    • Manual execution by user

      • systempropertiesadvanced.exe (PID: 2956)
      • Netflix Account Generator.exe (PID: 3820)
      • control.exe (PID: 2888)
      • explorer.exe (PID: 3064)
      • explorer.exe (PID: 1564)
      • systempropertiesadvanced.exe (PID: 3316)
    • Creates files in the user directory

      • chrome.exe (PID: 3272)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 3272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
92
Monitored processes
48
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs control.exe no specs systempropertiesadvanced.exe no specs systempropertiesadvanced.exe netflix account generator.exe #HAWKEYE lawnmower.exe vbc.exe vbc.exe no specs explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=8886105469335559868 --mojo-platform-channel-handle=3632 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=4873874691239487083 --mojo-platform-channel-handle=4252 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
916"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=18369935251416502076 --mojo-platform-channel-handle=4728 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1168"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=2349236501386599943 --mojo-platform-channel-handle=4604 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1348"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16218165656329531375 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1392"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=11687521686999072191 --mojo-platform-channel-handle=1564 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1564"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2184"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4410178072708318868 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2308C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\admin\AppData\Local\Temp\holderwb.txt"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exelawnmower.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
0
Version:
8.0.50727.5420
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
2316"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1044,1001029464361440216,2248630948709696884,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=7438294057605123086 --mojo-platform-channel-handle=3892 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
1 765
Read events
1 571
Write events
170
Delete events
24

Modification events

(PID) Process:(3144) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:3272-13227878136522750
Value:
259
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3120-13213713943555664
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
8
Suspicious files
59
Text files
269
Unknown types
7

Dropped files

PID
Process
Filename
Type
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5E60D5F8-CC8.pma
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\07608b20-ee7b-4e05-957b-ce0b3a42c5b0.tmp
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000028.dbtmp
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RFa65d0c.TMPtext
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFa65d0c.TMPtext
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.oldtext
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RFa65e83.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
66
DNS requests
41
Threats
13

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3672
lawnmower.exe
GET
301
104.16.155.36:80
http://whatismyipaddress.com/
US
shared
1392
chrome.exe
GET
302
216.58.210.14:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
509 b
whitelisted
1392
chrome.exe
GET
200
143.204.101.79:80
http://www.pepestes.com/4twejyp4%3E6hd9/setup_Your%20File%20Is%20Ready%20To%20Download.exe
US
executable
2.93 Mb
malicious
1392
chrome.exe
GET
302
52.214.251.189:80
http://trk.yarndestruction.club/aff_r?offer_id=194&aff_id=1000&url=https%3A%2F%2Fd1ujltfh043bem.cloudfront.net%2Fi%2Findex.php%3Fch%3D102f2b0dd0322da4ca12704dbd9685%26t%3DYour%2520File%2520Is%2520Ready%2520To%2520Download&urlauth=282161769347176488362835140765
IE
html
314 b
suspicious
1392
chrome.exe
GET
302
216.58.210.14:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
514 b
whitelisted
1392
chrome.exe
GET
200
143.204.101.94:80
http://arm.deskocean.xyz/cbcccb6dd340b032125f2da01d3241086275/
US
html
2.96 Kb
malicious
1392
chrome.exe
GET
302
52.214.251.189:80
http://trk.yarndestruction.club/aff_c?source=9945&offer_id=194&aff_id=1000&aff_sub=2230164319949921988&aff_sub2=714041&aff_sub3=&aff_sub4=browser&aff_sub5=9945&aff_unique1=&aff_unique2=&aff_unique3=&name=Your%20File%20Is%20Ready%20To%20Download&url=
IE
html
425 b
suspicious
1392
chrome.exe
GET
200
143.204.101.43:80
http://care.stoneglove.xyz/fit/Your%20File%20Is%20Ready%20To%20Download/2230164319949921988/714041/
US
html
6.66 Kb
suspicious
1392
chrome.exe
GET
200
74.125.4.203:80
http://r5---sn-aigzrner.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOTRmQUFXVHlhaGJaUTdMLWtCSkNJUl9ZQQ/1.0.0.5_nmmhkkegccagdldgiimedpiccmgmieda.crx?cms_redirect=yes&mip=185.192.69.26&mm=28&mn=sn-aigzrner&ms=nvh&mt=1583404456&mv=m&mvi=4&pl=24&shardbypass=yes
US
crx
293 Kb
whitelisted
1392
chrome.exe
GET
200
173.194.138.200:80
http://r3---sn-aigzrn7d.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWVmQUFXS041NV9ZVXlJVWwxbGc5TUM4dw/7519.422.0.3_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mip=185.192.69.26&mm=28&mn=sn-aigzrn7d&ms=nvh&mt=1583404517&mv=m&mvi=2&pl=24&shardbypass=yes
US
crx
862 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1392
chrome.exe
172.217.16.131:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
1392
chrome.exe
104.31.87.73:443
anonfile.com
Cloudflare Inc
US
unknown
1392
chrome.exe
216.58.208.40:443
www.googletagmanager.com
Google Inc.
US
whitelisted
1392
chrome.exe
151.101.2.217:443
vjs.zencdn.net
Fastly
US
suspicious
1392
chrome.exe
104.18.38.148:443
shermore.info
Cloudflare Inc
US
shared
1392
chrome.exe
104.18.10.142:443
singlyglobalti.info
Cloudflare Inc
US
unknown
1392
chrome.exe
143.204.98.51:443
d3ud741uvs727m.cloudfront.net
US
malicious
1392
chrome.exe
35.174.26.6:443
yestedshere.site
Amazon.com, Inc.
US
suspicious
1392
chrome.exe
172.217.21.206:443
www.google-analytics.com
Google Inc.
US
whitelisted
1392
chrome.exe
172.217.22.4:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
anonfile.com
  • 104.31.87.73
  • 104.31.86.73
whitelisted
clientservices.googleapis.com
  • 172.217.16.131
whitelisted
accounts.google.com
  • 195.216.236.230
shared
vjs.zencdn.net
  • 151.101.2.217
  • 151.101.66.217
  • 151.101.130.217
  • 151.101.194.217
whitelisted
www.googletagmanager.com
  • 216.58.208.40
whitelisted
shermore.info
  • 104.18.38.148
  • 104.18.39.148
whitelisted
d3ud741uvs727m.cloudfront.net
  • 143.204.98.51
  • 143.204.98.167
  • 143.204.98.150
  • 143.204.98.31
whitelisted
www.google-analytics.com
  • 172.217.21.206
whitelisted
singlyglobalti.info
  • 104.18.10.142
  • 104.18.11.142
shared
www.google.com
  • 172.217.22.4
malicious

Threats

PID
Process
Class
Message
1392
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1392
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1392
chrome.exe
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
1392
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1392
chrome.exe
Misc activity
ET INFO EXE - Served Attached HTTP
1052
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
3672
lawnmower.exe
Potential Corporate Privacy Violation
ET POLICY Known External IP Lookup Service Domain in SNI
3672
lawnmower.exe
Potential Corporate Privacy Violation
ET POLICY Known External IP Lookup Service Domain in SNI
3672
lawnmower.exe
A Network Trojan was detected
SPYWARE [PTsecurity] HawkEye / Predator Pain (IP Chck)
3672
lawnmower.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
3 ETPRO signatures available at the full report
No debug info