File name:

Virage-Grow-A-Garden-Macro-main.zip

Full analysis: https://app.any.run/tasks/950902e4-4407-4836-8f1a-171af8fbf4ad
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 24, 2025, 10:38:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ahk
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

FC82F395990E75B8B1E85E4A6B426012

SHA1:

6B7AA2A3F6861C5FB2C99DDF86DCE173FDE0D0C4

SHA256:

FFD3B4BD6258D5F8AF951FBA6D5A2CF894E04FBF47EDD391A4F5F0BE8B5FAACA

SSDEEP:

49152:0BEWREcjf+F+XiS8CjdH5MFYhen5V+yHfKIsJqxeaCkZWsTPhO4ILb4brWpfJjKx:0BxEcjGFSnjV5fkIyHfKIsJqxXC/+Po0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AHK has been detected (YARA)

      • setup.exe (PID: 3616)
      • AutoHotkey.exe (PID: 3804)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • AutoHotkey_1.1.37.02_setup.exe (PID: 3416)
      • setup.exe (PID: 3616)
    • Creates a software uninstall entry

      • setup.exe (PID: 3616)
    • Reads Microsoft Outlook installation path

      • setup.exe (PID: 3616)
      • hh.exe (PID: 2000)
    • Reads security settings of Internet Explorer

      • setup.exe (PID: 3616)
    • Reads the Internet Settings

      • setup.exe (PID: 3616)
      • hh.exe (PID: 2000)
    • Reads Internet Explorer settings

      • setup.exe (PID: 3616)
      • hh.exe (PID: 2000)
    • There is functionality for taking screenshot (YARA)

      • setup.exe (PID: 3616)
      • AutoHotkey.exe (PID: 3804)
    • Application launched itself

      • AutoHotkey.exe (PID: 2856)
      • AutoHotkey.exe (PID: 3804)
  • INFO

    • Manual execution by a user

      • chrome.exe (PID: 972)
      • AutoHotkey.exe (PID: 2856)
      • AutoHotkey.exe (PID: 3804)
    • The sample compiled with english language support

      • chrome.exe (PID: 3396)
      • chrome.exe (PID: 972)
      • AutoHotkey_1.1.37.02_setup.exe (PID: 3416)
      • setup.exe (PID: 3616)
      • chrome.exe (PID: 2296)
    • Launching a file from the Downloads directory

      • chrome.exe (PID: 972)
    • Application launched itself

      • chrome.exe (PID: 972)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 3396)
      • chrome.exe (PID: 972)
      • chrome.exe (PID: 2296)
    • AutoHotkey executable

      • chrome.exe (PID: 972)
      • AutoHotkey.exe (PID: 2856)
      • AutoHotkey.exe (PID: 3804)
    • Checks supported languages

      • AutoHotkey_1.1.37.02_setup.exe (PID: 3416)
      • setup.exe (PID: 3616)
      • AutoHotkey.exe (PID: 2856)
      • AutoHotkey.exe (PID: 3804)
      • AutoHotkey.exe (PID: 3104)
      • AutoHotkey.exe (PID: 3812)
    • Create files in a temporary directory

      • AutoHotkey_1.1.37.02_setup.exe (PID: 3416)
      • hh.exe (PID: 2000)
    • Reads the machine GUID from the registry

      • setup.exe (PID: 3616)
      • hh.exe (PID: 2000)
    • Reads the computer name

      • AutoHotkey.exe (PID: 2856)
      • setup.exe (PID: 3616)
    • Process checks whether UAC notifications are on

      • AutoHotkey.exe (PID: 2856)
      • setup.exe (PID: 3616)
    • Checks proxy server information

      • setup.exe (PID: 3616)
      • hh.exe (PID: 2000)
    • Detects AutoHotkey samples (YARA)

      • AutoHotkey_1.1.37.02_setup.exe (PID: 3416)
      • setup.exe (PID: 3616)
      • AutoHotkey.exe (PID: 3804)
    • Creates files or folders in the user directory

      • hh.exe (PID: 2000)
    • Reads security settings of Internet Explorer

      • hh.exe (PID: 2000)
    • Creates files in the program directory

      • setup.exe (PID: 3616)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:06:21 10:55:40
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Virage-Grow-A-Garden-Macro-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
34
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs autohotkey_1.1.37.02_setup.exe no specs autohotkey_1.1.37.02_setup.exe #AHK setup.exe autohotkey.exe no specs autohotkey.exe no specs hh.exe no specs #AHK autohotkey.exe no specs chrome.exe no specs chrome.exe autohotkey.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
284"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1356 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
656"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --mojo-platform-channel-handle=4584 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
972"C:\Program Files\Google\Chrome\Application\chrome.exe" "--disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1028"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1076 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1236"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3128 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1332"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=1752 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1472"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1076 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1976"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=4584 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2000"hh.exe" "ms-its:AutoHotkey.chm::/docs/Welcome.htm"C:\Windows\hh.exeAutoHotkey.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® HTML Help Executable
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\hh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\hhctrl.ocx
c:\windows\system32\user32.dll
2164"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4064 --field-trial-handle=1060,i,5198203584053391004,13118063916259394611,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
8 874
Read events
8 718
Write events
138
Delete events
18

Modification events

(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2756) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main.zip
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2756) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
20
Suspicious files
115
Text files
69
Unknown types
20

Dropped files

PID
Process
Filename
Type
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\BarlosWithaB.pngimage
MD5:DA3D6087A33AB440BE125B1427B34946
SHA256:90CE50D1D26EFB1E5EBD3E6842AB694876B5A474CB1975BF405A43BFCE2AFF37
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\BLXRMAD.pngimage
MD5:EAD78E6DA95D4572AACAD18D588B0CE5
SHA256:C865EEDE352AAE23C23ACDE0EFFDD2A1E22B78E5AFED6ADA7581BE6FC684B584
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\zay_karate744.pngimage
MD5:95EFA25AC4B9998370E07AC0E43B829F
SHA256:3D4DDDB9402CE5CE5CFD07CAEC9D7CFE5FE21A1AE0A812AEC32ECA5A7CB12E33
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\Virage.pngimage
MD5:D2016AF42C2D21D471D0319E4E60C83F
SHA256:52887382BBA7B89916B2109AEA5EDA5A16531EE07FFE23C109F67CE548FDCD97
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\KanniiCom.pngimage
MD5:89683D42C23EC0C1A483BD07C2CE489A
SHA256:5A83A8817ABA953832C333AE569FE66497164C92F0797CDD4F6CDC3280094712
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\Gurkendippp.pngimage
MD5:E962FE0FE1FA12A3037221988977C207
SHA256:8341D2CBFC34B408C4258F98182D4AC27775C5B1FF6161D3FB904AC54D7C7DBA
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\Freezy_Zer0.pngimage
MD5:A58A012A9AB899D938F8749C13774079
SHA256:0775D48B52F3C09A02901C764E118DA5AD758EAA1358C862D0D187618C2FCE7E
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\Not_Ausstinn.pngimage
MD5:C60074C6421EC8D2ACB1244E1CC4FB96
SHA256:CD8A487FF90EEF24CD20E875F6FB91186D7ECD03057C0690CF01DB9795543389
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\Jake_XvY.pngimage
MD5:CA0990AE4FE549468AB7DBED723C43A9
SHA256:06D3B1294201B429FAA457B140D55894DCADD5E6DB8F9AFC4AF590E45FABF555
2756WinRAR.exeC:\Users\admin\Desktop\Virage-Grow-A-Garden-Macro-main\Images\avatars\peanut1268a.pngimage
MD5:583C17128B51675C7E185946B26C2BE2
SHA256:C4CEC4A0C26003E1F8F0E44724B157EA1C4A175AC4CE9D3F482BE70329EE9D13
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
63
DNS requests
62
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
860
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
860
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
972
chrome.exe
239.255.255.250:1900
whitelisted
3396
chrome.exe
142.250.185.99:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
3396
chrome.exe
108.177.15.84:443
accounts.google.com
GOOGLE
US
whitelisted
3396
chrome.exe
142.250.185.196:443
www.google.com
GOOGLE
US
whitelisted
3396
chrome.exe
142.250.184.227:443
www.gstatic.com
GOOGLE
US
whitelisted
3396
chrome.exe
142.250.185.106:443
ogads-pa.clients6.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
clientservices.googleapis.com
  • 142.250.185.99
whitelisted
accounts.google.com
  • 108.177.15.84
whitelisted
www.google.com
  • 142.250.185.196
whitelisted
www.gstatic.com
  • 142.250.184.227
whitelisted
ogads-pa.clients6.google.com
  • 142.250.185.106
whitelisted
apis.google.com
  • 142.250.185.174
whitelisted
encrypted-tbn0.gstatic.com
  • 142.250.181.238
whitelisted
play.google.com
  • 142.250.186.110
whitelisted
update.googleapis.com
  • 142.250.185.67
  • 142.250.186.35
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
No debug info