File name:

ChromeSetup.exe

Full analysis: https://app.any.run/tasks/bb5a87e1-0fed-44ed-896c-6fd7aad33ab1
Verdict: Malicious activity
Analysis date: December 14, 2024, 09:32:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

828953B8FC76FD27CAEFB03D7C44E64E

SHA1:

B406E1FA096BBE358B9D78C4A896E8CBC8C5BE5B

SHA256:

01E4DFB7845EE620BF61CDC6D4F0AE99A31F7114C85608398409B945D8AE08A4

SSDEEP:

98304:CvPHTg70qMK46SByzYBh9RWEdpa5pIIJjtOBJOWrLav4us1/nqj2xzG+oo2IJ5XK:KfgTV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • setup.exe (PID: 6980)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ChromeSetup.exe (PID: 6376)
      • updater.exe (PID: 6624)
    • Application launched itself

      • ChromeSetup.exe (PID: 6376)
      • updater.exe (PID: 6624)
      • updater.exe (PID: 6724)
      • updater.exe (PID: 6844)
      • setup.exe (PID: 7004)
      • setup.exe (PID: 6980)
    • Executes as Windows Service

      • updater.exe (PID: 6844)
      • updater.exe (PID: 6724)
    • Executable content was dropped or overwritten

      • updater.exe (PID: 6724)
      • 131.0.6778.140_chrome_installer.exe (PID: 3928)
      • setup.exe (PID: 6980)
      • updater.exe (PID: 6624)
    • Checks Windows Trust Settings

      • updater.exe (PID: 6624)
    • Creates a software uninstall entry

      • setup.exe (PID: 6980)
      • chrome.exe (PID: 6368)
    • Searches for installed software

      • setup.exe (PID: 6980)
  • INFO

    • The sample compiled with english language support

      • ChromeSetup.exe (PID: 6376)
      • updater.exe (PID: 6724)
      • 131.0.6778.140_chrome_installer.exe (PID: 3928)
      • setup.exe (PID: 6980)
      • updater.exe (PID: 6624)
    • Reads the computer name

      • ChromeSetup.exe (PID: 6376)
      • ChromeSetup.exe (PID: 6548)
      • updater.exe (PID: 6624)
      • updater.exe (PID: 6844)
      • updater.exe (PID: 6724)
      • 131.0.6778.140_chrome_installer.exe (PID: 3928)
      • setup.exe (PID: 6980)
      • setup.exe (PID: 7004)
      • elevation_service.exe (PID: 6340)
    • Checks supported languages

      • ChromeSetup.exe (PID: 6376)
      • ChromeSetup.exe (PID: 6548)
      • updater.exe (PID: 6644)
      • updater.exe (PID: 6624)
      • updater.exe (PID: 6744)
      • updater.exe (PID: 6844)
      • updater.exe (PID: 6864)
      • 131.0.6778.140_chrome_installer.exe (PID: 3928)
      • setup.exe (PID: 6980)
      • setup.exe (PID: 7004)
      • setup.exe (PID: 7000)
      • setup.exe (PID: 5316)
      • elevation_service.exe (PID: 6340)
      • updater.exe (PID: 6724)
    • Creates files in the program directory

      • ChromeSetup.exe (PID: 6548)
      • updater.exe (PID: 6644)
      • updater.exe (PID: 6624)
      • updater.exe (PID: 6724)
      • updater.exe (PID: 6844)
      • setup.exe (PID: 7004)
      • setup.exe (PID: 6980)
    • Process checks computer location settings

      • ChromeSetup.exe (PID: 6376)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 6724)
      • updater.exe (PID: 6844)
      • updater.exe (PID: 6624)
    • Checks proxy server information

      • updater.exe (PID: 6624)
    • Reads the software policy settings

      • updater.exe (PID: 6844)
      • updater.exe (PID: 6624)
    • Reads the machine GUID from the registry

      • updater.exe (PID: 6624)
    • Creates files or folders in the user directory

      • updater.exe (PID: 6624)
    • Create files in a temporary directory

      • updater.exe (PID: 6624)
    • Manual execution by a user

      • chrome.exe (PID: 6368)
    • Application launched itself

      • chrome.exe (PID: 6368)
    • Executes as Windows Service

      • elevation_service.exe (PID: 6340)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:11 16:02:03+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 3429376
InitializedDataSize: 6935040
UninitializedDataSize: -
EntryPoint: 0x1be4e0
OSVersion: 10
ImageVersion: -
SubsystemVersion: 10
Subsystem: Windows GUI
FileVersionNumber: 132.0.6833.0
ProductVersionNumber: 132.0.6833.0
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Google LLC
FileDescription: Google Installer
FileVersion: 132.0.6833.0
InternalName: Google Installer (x86)
LegalCopyright: Copyright 2024 Google LLC. All rights reserved.
OriginalFileName: UpdaterSetup.exe
ProductName: Google Installer
ProductVersion: 132.0.6833.0
CompanyShortName: Google
ProductShortName: GoogleUpdater
LastChange: fba838c6a3184f5070b77238fdbbca1b3d990105-refs/branch-heads/6833@{#1}
OfficialBuild: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
28
Malicious processes
2
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chromesetup.exe no specs chromesetup.exe updater.exe updater.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs 131.0.6778.140_chrome_installer.exe setup.exe setup.exe no specs setup.exe no specs setup.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe elevation_service.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1540"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\131.0.6778.140\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2088"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4960,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=5016 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\131.0.6778.140\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3928"C:\WINDOWS\SystemTemp\chrome_Unpacker_BeginUnzipping6844_1392598528\131.0.6778.140_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6844_1392598528\96eef778-32b2-4308-840c-25e2104cd7e4.tmp"C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6844_1392598528\131.0.6778.140_chrome_installer.exe
updater.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Chrome Installer
Exit code:
0
Version:
131.0.6778.140
Modules
Images
c:\windows\systemtemp\chrome_unpacker_beginunzipping6844_1392598528\131.0.6778.140_chrome_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
3988"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations=is-enterprise-managed=no --field-trial-handle=2264,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:3C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4384"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4476,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=4508 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\131.0.6778.140\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
4444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=3384 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\131.0.6778.140\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
4536"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1952,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=1948 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5316C:\WINDOWS\SystemTemp\chrome_Unpacker_BeginUnzipping6844_1392598528\CR_85D5A.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\WINDOWS\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.140 --initial-client-data=0x29c,0x2a0,0x2a4,0x27c,0x2a8,0x7ff61b375d68,0x7ff61b375d74,0x7ff61b375d80C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6844_1392598528\CR_85D5A.tmp\setup.exesetup.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Chrome Installer
Exit code:
0
Version:
131.0.6778.140
Modules
Images
c:\windows\systemtemp\chrome_unpacker_beginunzipping6844_1392598528\cr_85d5a.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5284,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
5392"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3956,i,4521718774368460527,7959829534552752799,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
131.0.6778.140
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\131.0.6778.140\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
5 491
Read events
5 249
Write events
213
Delete events
29

Modification events

(PID) Process:(6844) updater.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
0
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
132.0.6833.0
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
132.0.6833.0
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A2F4279-5AFC-549D-B352-F32E6DBAC9DF}
Operation:writeName:AppID
Value:
{8A2F4279-5AFC-549D-B352-F32E6DBAC9DF}
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8A2F4279-5AFC-549D-B352-F32E6DBAC9DF}
Operation:writeName:LocalService
Value:
GoogleUpdaterInternalService132.0.6833.0
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{8A2F4279-5AFC-549D-B352-F32E6DBAC9DF}
Operation:writeName:ServiceParameters
Value:
--com-service
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D624A353-7B91-5E8B-B5AC-AA415F46F083}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(6624) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D624A353-7B91-5E8B-B5AC-AA415F46F083}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
9
Suspicious files
73
Text files
44
Unknown types
7

Dropped files

PID
Process
Filename
Type
6548ChromeSetup.exeC:\Windows\SystemTemp\Google6548_151836569\UPDATER.PACKED.7Z
MD5:
SHA256:
6624updater.exeC:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\Crashpad\settings.datbinary
MD5:E0F0D853F2F4E0E466D5689022EF69D6
SHA256:FE499BD96E3F940F24BC6834AC2FFE06FBC3D65D1D1009ADDDB3439B1BF9DE13
6624updater.exeC:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\updater.exeexecutable
MD5:9DB9D09B6A58E5C09773F754504AC148
SHA256:C294551059A85542127811249B8E725D3AB885EFDD4996B201DB588899769E85
6724updater.exeC:\Windows\SystemTemp\Google6724_667683644\scoped_dir6724_8540299\GoogleUpdate.exeexecutable
MD5:3AA2C853D6BC7AF7F2F9B8A934943EFD
SHA256:07034876B9EC0B59432B96FEDB7E10E332440159F9802FAAD5F5B99F01885F6B
6624updater.exeC:\Program Files (x86)\Google\GoogleUpdater\132.0.6833.0\uninstall.cmdtext
MD5:FBC297EE9060D4256192E4EDB98CAD1B
SHA256:099592FFA867124D16C0C6D868AF1214FD2B7180FA76E4EEE01ABF2A5CF8F044
6624updater.exeC:\Program Files (x86)\Google\GoogleUpdater\c0d6fb95-acab-48c4-b3fd-381d1f7e3440.tmpbinary
MD5:88BD7C8114993ADB9D7903AFA0A526C9
SHA256:BB3C4B90702246FDF6C3698037DE42BF1949B5028C354647AA65024373F341A4
6844updater.exeC:\Windows\SystemTemp\chrome_url_fetcher_6844_565699085\-8a69d345-d564-463c-aff1-a69d9e530f96-_131.0.6778.140_all_njoqidoxcf62e4hm67z3m4iu7m.crx3
MD5:
SHA256:
6844updater.exeC:\Program Files (x86)\Google\GoogleUpdater\crx_cache\{8a69d345-d564-463c-aff1-a69d9e530f96}_1.61d8778d36e58c2093ae462b6e6fe5c550c1850da7fb319ea92021c938744946
MD5:
SHA256:
6844updater.exeC:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping6844_1392598528\131.0.6778.140_chrome_installer.exe
MD5:
SHA256:
6624updater.exeC:\Program Files (x86)\Google\GoogleUpdater\updater.logtext
MD5:CD8423F8C7413181BF6805C8C10D1CE4
SHA256:BA79FB5AEF6A4B6BE81033B3A5965D273964957E204C47E2F8331CFE2E419A3B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
51
DNS requests
48
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6624
updater.exe
GET
200
142.250.186.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6624
updater.exe
GET
200
142.250.186.131:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDIOoql8hHyJhDFZvyBCxik
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6624
updater.exe
GET
200
216.58.212.163:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6168
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4540
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6168
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.178:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1076
svchost.exe
23.218.210.69:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
www.bing.com
  • 104.126.37.178
  • 104.126.37.129
  • 104.126.37.130
  • 104.126.37.131
  • 104.126.37.137
  • 104.126.37.186
  • 104.126.37.136
  • 104.126.37.185
  • 104.126.37.177
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 216.58.212.142
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.2
  • 20.190.159.68
  • 20.190.159.0
  • 40.126.31.73
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
update.googleapis.com
  • 172.217.16.195
whitelisted
dl.google.com
  • 142.250.181.238
whitelisted

Threats

No threats detected
No debug info