5.6
高危

d8cea078199dbdef51ec7189cf03541bbcbd10c49a133b187348e2a24fe1e2eb

8fd5cc075d71bcc33cf6e7d6ce4c9afb.exe

分析耗时

94s

最近分析

文件大小

1001.0KB
静态报毒 动态报毒 AI SCORE=100 AIDETECTVM BINYD BSCOPE CLASSIC CONFIDENCE DELF DELPHILESS EGEV ENDM ENEZ FAREIT GENETIC GW@A0WGEJNI HIGH CONFIDENCE HTMIST KRYPTIK LOKIBOT LXKE MALWARE2 MALWARE@#Z7RORGT6SEJF QUASAR QVM05 SCORE SUSPICIOUS PE UNSAFE X2094 XQFXBZE ZELPHIF 更多
鹰眼引擎
未检测 暂无鹰眼引擎检测结果
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
McAfee Fareit-FYT!8FD5CC075D71 20201023 6.0.6.653
Alibaba TrojanSpy:Win32/Injector.6798665a 20190527 0.3.0.5
Baidu 20190318 1.0.0.2
Avast Win32:Trojan-gen 20201023 18.4.3895.0
Tencent Win32.Trojan-spy.Quasar.Egev 20201023 1.0.0.1
Kingsoft 20201023 2013.8.14.323
CrowdStrike win/malicious_confidence_90% (W) 20190702 1.0
行为判定
动态指标
HTTP traffic contains suspicious features which may be indicative of malware related traffic (1 个事件)
suspicious_features POST method with no referer header suspicious_request POST https://update.googleapis.com/service/update2?cup2key=10:726727581&cup2hreq=078bada7aebdc673135395408ef80f5dba99ee202d5f1ca9c1b00b9232ec5264
Performs some HTTP requests (4 个事件)
request HEAD http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
request HEAD http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620804021&mv=m&mvi=1&pl=23&shardbypass=yes
request HEAD http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=354df93780db1d&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620804282&mv=m&mvi=3
request POST https://update.googleapis.com/service/update2?cup2key=10:726727581&cup2hreq=078bada7aebdc673135395408ef80f5dba99ee202d5f1ca9c1b00b9232ec5264
Sends data using the HTTP POST Method (1 个事件)
request POST https://update.googleapis.com/service/update2?cup2key=10:726727581&cup2hreq=078bada7aebdc673135395408ef80f5dba99ee202d5f1ca9c1b00b9232ec5264
Allocates read-write-execute memory (usually to unpack itself) (1 个事件)
Time & API Arguments Status Return Repeated
1620833172.343249
NtAllocateVirtualMemory
process_identifier: 1880
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
process_handle: 0xffffffff
allocation_type: 4096 (MEM_COMMIT)
base_address: 0x01d10000
success 0 0
The binary likely contains encrypted or compressed data indicative of a packer (2 个事件)
entropy 7.63711456617936 section {'size_of_data': '0x00078a00', 'virtual_address': '0x00088000', 'entropy': 7.63711456617936, 'name': '.rsrc', 'virtual_size': '0x00078850'} description A section with a high entropy has been found
entropy 0.4825 description Overall entropy of this PE file is high
网络通信
Communicates with host for which no DNS query was performed (2 个事件)
host 172.217.24.14
host 203.208.40.66
File has been identified by 54 AntiVirus engines on VirusTotal as malicious (50 out of 54 个事件)
Bkav W32.AIDetectVM.malware2
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.Delf.FareIt.Gen.13
FireEye Generic.mg.8fd5cc075d71bcc3
McAfee Fareit-FYT!8FD5CC075D71
Cylance Unsafe
SUPERAntiSpyware Trojan.Agent/Gen-Downloader
Sangfor Malware
K7AntiVirus Trojan ( 0056d8001 )
Alibaba TrojanSpy:Win32/Injector.6798665a
K7GW Trojan ( 0056d8001 )
Cybereason malicious.f6aa4f
Arcabit Trojan.Delf.FareIt.Gen.13
Cyren W32/Trojan.LXKE-0640
Symantec Trojan.Gen.2
APEX Malicious
Avast Win32:Trojan-gen
ClamAV Win.Trojan.Quasar-9752325-0
Kaspersky HEUR:Trojan-Spy.Win32.Quasar.gen
BitDefender Trojan.Delf.FareIt.Gen.13
NANO-Antivirus Trojan.Win32.Quasar.htmist
Paloalto generic.ml
AegisLab Trojan.Win32.Quasar.l!c
Tencent Win32.Trojan-spy.Quasar.Egev
Ad-Aware Trojan.Delf.FareIt.Gen.13
Comodo Malware@#z7rorgt6sejf
DrWeb Trojan.PWS.Stealer.29258
VIPRE Trojan.Win32.Generic!BT
Invincea Mal/Generic-S
McAfee-GW-Edition BehavesLike.Win32.Fareit.fc
Sophos Mal/Generic-S
SentinelOne DFI - Suspicious PE
Jiangmin TrojanSpy.Quasar.bw
Avira TR/Injector.binyd
Microsoft Trojan:Win32/Lokibot.SS!MTB
ZoneAlarm HEUR:Trojan-Spy.Win32.Quasar.gen
GData Trojan.Delf.FareIt.Gen.13
AhnLab-V3 Suspicious/Win.Delphiless.X2094
Acronis suspicious
BitDefenderTheta Gen:NN.ZelphiF.34570.!GW@a0WgEjni
ALYac Trojan.Delf.FareIt.Gen.13
MAX malware (ai score=100)
VBA32 BScope.Trojan.Kryptik
Zoner Trojan.Win32.92881
ESET-NOD32 a variant of Win32/Injector.ENDM
Rising Trojan.Injector!1.CB34 (CLASSIC)
Yandex Trojan.Injector!jCx/xqfXBzE
Ikarus Trojan.Win32.Injector
eGambit Unsafe.AI_Score_99%
Fortinet W32/Injector.ENEZ!tr
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) (2 个事件)
dead_host 172.217.24.14:443
dead_host 172.217.160.78:443
可视化分析
二进制图像
暂无二进制图像 该样本未生成二进制可视化图像
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

Imports

Library kernel32.dll:
0x47b164 VirtualFree
0x47b168 VirtualAlloc
0x47b16c LocalFree
0x47b170 LocalAlloc
0x47b174 GetVersion
0x47b178 GetCurrentThreadId
0x47b184 VirtualQuery
0x47b188 WideCharToMultiByte
0x47b190 MultiByteToWideChar
0x47b194 lstrlenA
0x47b198 lstrcpynA
0x47b19c LoadLibraryExA
0x47b1a0 GetThreadLocale
0x47b1a4 GetStartupInfoA
0x47b1a8 GetProcAddress
0x47b1ac GetModuleHandleA
0x47b1b0 GetModuleFileNameA
0x47b1b4 GetLocaleInfoA
0x47b1b8 GetLastError
0x47b1c0 GetCommandLineA
0x47b1c4 FreeLibrary
0x47b1c8 FindFirstFileA
0x47b1cc FindClose
0x47b1d0 ExitProcess
0x47b1d4 WriteFile
0x47b1dc RtlUnwind
0x47b1e0 RaiseException
0x47b1e4 GetStdHandle
Library user32.dll:
0x47b1ec GetKeyboardType
0x47b1f0 LoadStringA
0x47b1f4 MessageBoxA
0x47b1f8 CharNextA
Library advapi32.dll:
0x47b200 RegQueryValueExA
0x47b204 RegOpenKeyExA
0x47b208 RegCloseKey
Library oleaut32.dll:
0x47b210 SysFreeString
0x47b214 SysReAllocStringLen
0x47b218 SysAllocStringLen
Library kernel32.dll:
0x47b220 TlsSetValue
0x47b224 TlsGetValue
0x47b228 LocalAlloc
0x47b22c GetModuleHandleA
Library advapi32.dll:
0x47b234 RegQueryValueExA
0x47b238 RegOpenKeyExA
0x47b23c RegCloseKey
Library kernel32.dll:
0x47b244 lstrcpyA
0x47b248 WriteFile
0x47b24c WaitForSingleObject
0x47b250 VirtualQuery
0x47b254 VirtualProtect
0x47b258 VirtualAlloc
0x47b25c Sleep
0x47b260 SizeofResource
0x47b264 SetThreadLocale
0x47b268 SetFilePointer
0x47b26c SetEvent
0x47b270 SetErrorMode
0x47b274 SetEndOfFile
0x47b278 ResetEvent
0x47b27c ReadFile
0x47b280 MulDiv
0x47b284 LockResource
0x47b288 LoadResource
0x47b28c LoadLibraryA
0x47b298 GlobalUnlock
0x47b29c GlobalReAlloc
0x47b2a0 GlobalHandle
0x47b2a4 GlobalLock
0x47b2a8 GlobalFree
0x47b2ac GlobalFindAtomA
0x47b2b0 GlobalDeleteAtom
0x47b2b4 GlobalAlloc
0x47b2b8 GlobalAddAtomA
0x47b2bc GetVersionExA
0x47b2c0 GetVersion
0x47b2c4 GetTickCount
0x47b2c8 GetThreadLocale
0x47b2cc GetSystemInfo
0x47b2d0 GetStringTypeExA
0x47b2d4 GetStdHandle
0x47b2d8 GetProcAddress
0x47b2dc GetModuleHandleA
0x47b2e0 GetModuleFileNameA
0x47b2e4 GetLocaleInfoA
0x47b2e8 GetLocalTime
0x47b2ec GetLastError
0x47b2f0 GetFullPathNameA
0x47b2f4 GetFileAttributesA
0x47b2f8 GetDiskFreeSpaceA
0x47b2fc GetDateFormatA
0x47b300 GetCurrentThreadId
0x47b304 GetCurrentProcessId
0x47b308 GetCPInfo
0x47b30c GetACP
0x47b310 FreeResource
0x47b314 InterlockedExchange
0x47b318 FreeLibrary
0x47b31c FormatMessageA
0x47b320 FindResourceA
0x47b324 FindNextFileA
0x47b328 FindFirstFileA
0x47b32c FindClose
0x47b338 EnumCalendarInfoA
0x47b344 CreateThread
0x47b348 CreateFileA
0x47b34c CreateEventA
0x47b350 CompareStringA
0x47b354 CloseHandle
Library version.dll:
0x47b35c VerQueryValueA
0x47b364 GetFileVersionInfoA
Library gdi32.dll:
0x47b36c UnrealizeObject
0x47b370 StretchBlt
0x47b374 SetWindowOrgEx
0x47b378 SetWinMetaFileBits
0x47b37c SetViewportOrgEx
0x47b380 SetTextColor
0x47b384 SetStretchBltMode
0x47b388 SetROP2
0x47b38c SetPixel
0x47b390 SetEnhMetaFileBits
0x47b394 SetDIBColorTable
0x47b398 SetBrushOrgEx
0x47b39c SetBkMode
0x47b3a0 SetBkColor
0x47b3a4 SelectPalette
0x47b3a8 SelectObject
0x47b3ac SelectClipRgn
0x47b3b0 SaveDC
0x47b3b4 RestoreDC
0x47b3b8 Rectangle
0x47b3bc RectVisible
0x47b3c0 RealizePalette
0x47b3c4 Polyline
0x47b3c8 PlayEnhMetaFile
0x47b3cc PatBlt
0x47b3d0 MoveToEx
0x47b3d4 MaskBlt
0x47b3d8 LineTo
0x47b3dc IntersectClipRect
0x47b3e0 GetWindowOrgEx
0x47b3e4 GetWinMetaFileBits
0x47b3e8 GetTextMetricsA
0x47b3f4 GetStockObject
0x47b3f8 GetPixel
0x47b3fc GetPaletteEntries
0x47b400 GetObjectA
0x47b40c GetEnhMetaFileBits
0x47b410 GetDeviceCaps
0x47b414 GetDIBits
0x47b418 GetDIBColorTable
0x47b41c GetDCOrgEx
0x47b424 GetClipBox
0x47b428 GetBrushOrgEx
0x47b42c GetBitmapBits
0x47b430 ExtTextOutA
0x47b434 ExcludeClipRect
0x47b438 DeleteObject
0x47b43c DeleteEnhMetaFile
0x47b440 DeleteDC
0x47b444 CreateSolidBrush
0x47b448 CreatePenIndirect
0x47b44c CreatePalette
0x47b454 CreateFontIndirectA
0x47b458 CreateDIBitmap
0x47b45c CreateDIBSection
0x47b460 CreateCompatibleDC
0x47b468 CreateBrushIndirect
0x47b46c CreateBitmap
0x47b470 CopyEnhMetaFileA
0x47b474 BitBlt
Library user32.dll:
0x47b47c CreateWindowExA
0x47b480 WindowFromPoint
0x47b484 WinHelpA
0x47b488 WaitMessage
0x47b48c UpdateWindow
0x47b490 UnregisterClassA
0x47b494 UnhookWindowsHookEx
0x47b498 TranslateMessage
0x47b4a0 TrackPopupMenu
0x47b4a8 ShowWindow
0x47b4ac ShowScrollBar
0x47b4b0 ShowOwnedPopups
0x47b4b4 ShowCursor
0x47b4b8 SetWindowsHookExA
0x47b4bc SetWindowTextA
0x47b4c0 SetWindowPos
0x47b4c4 SetWindowPlacement
0x47b4c8 SetWindowLongA
0x47b4cc SetTimer
0x47b4d0 SetScrollRange
0x47b4d4 SetScrollPos
0x47b4d8 SetScrollInfo
0x47b4dc SetRect
0x47b4e0 SetPropA
0x47b4e4 SetParent
0x47b4e8 SetMenuItemInfoA
0x47b4ec SetMenu
0x47b4f0 SetForegroundWindow
0x47b4f4 SetFocus
0x47b4f8 SetCursor
0x47b4fc SetClassLongA
0x47b500 SetCapture
0x47b504 SetActiveWindow
0x47b508 SendMessageA
0x47b50c ScrollWindow
0x47b510 ScreenToClient
0x47b514 RemovePropA
0x47b518 RemoveMenu
0x47b51c ReleaseDC
0x47b520 ReleaseCapture
0x47b52c RegisterClassA
0x47b530 RedrawWindow
0x47b534 PtInRect
0x47b538 PostQuitMessage
0x47b53c PostMessageA
0x47b540 PeekMessageA
0x47b544 OffsetRect
0x47b548 OemToCharA
0x47b54c MessageBoxA
0x47b550 MapWindowPoints
0x47b554 MapVirtualKeyA
0x47b558 LoadStringA
0x47b55c LoadKeyboardLayoutA
0x47b560 LoadIconA
0x47b564 LoadCursorA
0x47b568 LoadBitmapA
0x47b56c KillTimer
0x47b570 IsZoomed
0x47b574 IsWindowVisible
0x47b578 IsWindowEnabled
0x47b57c IsWindow
0x47b580 IsRectEmpty
0x47b584 IsIconic
0x47b588 IsDialogMessageA
0x47b58c IsChild
0x47b590 InvalidateRect
0x47b594 IntersectRect
0x47b598 InsertMenuItemA
0x47b59c InsertMenuA
0x47b5a0 InflateRect
0x47b5a8 GetWindowTextA
0x47b5ac GetWindowRect
0x47b5b0 GetWindowPlacement
0x47b5b4 GetWindowLongA
0x47b5b8 GetWindowDC
0x47b5bc GetTopWindow
0x47b5c0 GetSystemMetrics
0x47b5c4 GetSystemMenu
0x47b5c8 GetSysColorBrush
0x47b5cc GetSysColor
0x47b5d0 GetSubMenu
0x47b5d4 GetScrollRange
0x47b5d8 GetScrollPos
0x47b5dc GetScrollInfo
0x47b5e0 GetPropA
0x47b5e4 GetParent
0x47b5e8 GetWindow
0x47b5ec GetMessageTime
0x47b5f0 GetMenuStringA
0x47b5f4 GetMenuState
0x47b5f8 GetMenuItemInfoA
0x47b5fc GetMenuItemID
0x47b600 GetMenuItemCount
0x47b604 GetMenu
0x47b608 GetLastActivePopup
0x47b60c GetKeyboardState
0x47b614 GetKeyboardLayout
0x47b618 GetKeyState
0x47b61c GetKeyNameTextA
0x47b620 GetIconInfo
0x47b624 GetForegroundWindow
0x47b628 GetFocus
0x47b62c GetDlgItem
0x47b630 GetDesktopWindow
0x47b634 GetDCEx
0x47b638 GetDC
0x47b63c GetCursorPos
0x47b640 GetCursor
0x47b644 GetClipboardData
0x47b648 GetClientRect
0x47b64c GetClassNameA
0x47b650 GetClassInfoA
0x47b654 GetCapture
0x47b658 GetActiveWindow
0x47b65c FrameRect
0x47b660 FindWindowA
0x47b664 FillRect
0x47b668 EqualRect
0x47b66c EnumWindows
0x47b670 EnumThreadWindows
0x47b674 EndPaint
0x47b678 EnableWindow
0x47b67c EnableScrollBar
0x47b680 EnableMenuItem
0x47b684 DrawTextA
0x47b688 DrawMenuBar
0x47b68c DrawIconEx
0x47b690 DrawIcon
0x47b694 DrawFrameControl
0x47b698 DrawFocusRect
0x47b69c DrawEdge
0x47b6a0 DispatchMessageA
0x47b6a4 DestroyWindow
0x47b6a8 DestroyMenu
0x47b6ac DestroyIcon
0x47b6b0 DestroyCursor
0x47b6b4 DeleteMenu
0x47b6b8 DefWindowProcA
0x47b6bc DefMDIChildProcA
0x47b6c0 DefFrameProcA
0x47b6c4 CreatePopupMenu
0x47b6c8 CreateMenu
0x47b6cc CreateIcon
0x47b6d0 ClientToScreen
0x47b6d4 CheckMenuItem
0x47b6d8 CallWindowProcA
0x47b6dc CallNextHookEx
0x47b6e0 BeginPaint
0x47b6e4 CharNextA
0x47b6e8 CharLowerBuffA
0x47b6ec CharLowerA
0x47b6f0 CharToOemA
0x47b6f4 AdjustWindowRectEx
Library kernel32.dll:
0x47b700 Sleep
Library oleaut32.dll:
0x47b708 SafeArrayPtrOfIndex
0x47b70c SafeArrayGetUBound
0x47b710 SafeArrayGetLBound
0x47b714 SafeArrayCreate
0x47b718 VariantChangeType
0x47b71c VariantCopy
0x47b720 VariantClear
0x47b724 VariantInit
Library comctl32.dll:
0x47b734 ImageList_Write
0x47b738 ImageList_Read
0x47b748 ImageList_DragMove
0x47b74c ImageList_DragLeave
0x47b750 ImageList_DragEnter
0x47b754 ImageList_EndDrag
0x47b758 ImageList_BeginDrag
0x47b75c ImageList_Remove
0x47b760 ImageList_DrawEx
0x47b764 ImageList_Replace
0x47b768 ImageList_Draw
0x47b778 ImageList_Add
0x47b780 ImageList_Destroy
0x47b784 ImageList_Create
Library comdlg32.dll:
0x47b78c GetOpenFileNameA
Library winmm.dll:
0x47b794 mciSendCommandA
0x47b798 mciGetErrorStringA
Library kernel32.dll:

Hosts

No hosts contacted.

TCP

Source Source Port Destination Destination Port
192.168.56.101 49187 113.108.239.194 r1---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49188 113.108.239.196 r3---sn-j5o7dn7e.gvt1.com 80
192.168.56.101 49186 203.208.41.65 redirector.gvt1.com 80
192.168.56.101 49185 203.208.41.66 update.googleapis.com 443

UDP

Source Source Port Destination Destination Port
192.168.56.101 49235 114.114.114.114 53
192.168.56.101 50568 114.114.114.114 53
192.168.56.101 51963 114.114.114.114 53
192.168.56.101 54260 114.114.114.114 53
192.168.56.101 55368 114.114.114.114 53
192.168.56.101 56539 114.114.114.114 53
192.168.56.101 57236 114.114.114.114 53
192.168.56.101 58367 114.114.114.114 53
192.168.56.101 58970 114.114.114.114 53
192.168.56.101 60088 114.114.114.114 53
192.168.56.101 137 192.168.56.255 137
192.168.56.101 138 192.168.56.255 138
192.168.56.101 123 20.189.79.72 time.windows.com 123
192.168.56.101 50002 224.0.0.252 5355
192.168.56.101 50534 224.0.0.252 5355
192.168.56.101 53210 224.0.0.252 5355
192.168.56.101 53657 224.0.0.252 5355
192.168.56.101 54178 224.0.0.252 5355
192.168.56.101 56804 224.0.0.252 5355
192.168.56.101 57756 224.0.0.252 5355

HTTP & HTTPS Requests

URI Data
http://redirector.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: redirector.gvt1.com

http://r1---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620804021&mv=m&mvi=1&pl=23&shardbypass=yes
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?cms_redirect=yes&mh=ms&mip=202.100.214.100&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620804021&mv=m&mvi=1&pl=23&shardbypass=yes HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r1---sn-j5o7dn7e.gvt1.com

http://r3---sn-j5o7dn7e.gvt1.com/edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=354df93780db1d&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620804282&mv=m&mvi=3
HEAD /edgedl/release2/update2/AIUdiWYcaIvMz1IBNCM0PPo_1.3.36.82/GoogleUpdateSetup.exe?mh=ms&pl=17&shardbypass=yes&redirect_counter=1&rm=sn-j5ok7e&req_id=354df93780db1d&cms_redirect=yes&ipbypass=yes&mip=59.50.85.19&mm=28&mn=sn-j5o7dn7e&ms=nvh&mt=1620804282&mv=m&mvi=3 HTTP/1.1
Connection: Keep-Alive
Accept: */*
Accept-Encoding: identity
User-Agent: Microsoft BITS/7.5
X-Old-UID: cnt=0
X-Last-HR: 0x0
X-Last-HTTP-Status-Code: 0
X-Retry-Count: 0
X-HTTP-Attempts: 1
Host: r3---sn-j5o7dn7e.gvt1.com

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.