URL:

https://www.microsoft.com/en-us/download/details.aspx?id=5201

Full analysis: https://app.any.run/tasks/065c76b6-22d1-4854-ab06-daa49d577b0f
Verdict: Malicious activity
Analysis date: January 01, 2021, 11:32:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

709F9825AF3E3B27296CA8EB045E5D29

SHA1:

003B4D26CABBBF4186D24AB589BC126FCB4BA4A9

SHA256:

04BAB2E4B80666AC0ADD57951E36C62A688CA263A8953AF56C4563AA686B18FE

SSDEEP:

3:N8DSLZRtRHd4m2EIM/q9T:2OLTDHdKEIR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MSEInstall.exe (PID: 3288)
      • epplauncher.exe (PID: 2952)
      • MSEInstall.exe (PID: 1928)
      • Setup.exe (PID: 2564)
      • MsMpEng.exe (PID: 2512)
      • MpCmdRun.exe (PID: 1404)
      • msseces.exe (PID: 2212)
      • MpCmdRun.exe (PID: 2668)
      • MpCmdRun.exe (PID: 2948)
      • MpCmdRun.exe (PID: 1756)
      • mpam-c989958d.exe (PID: 3556)
      • mpsigstub.exe (PID: 2844)
      • NisSrv.exe (PID: 3660)
    • Drops executable file immediately after starts

      • MSEInstall.exe (PID: 3288)
      • mpam-c989958d.exe (PID: 3556)
      • mpsigstub.exe (PID: 2844)
    • Actions looks like stealing of personal data

      • epplauncher.exe (PID: 2952)
    • Loads the Task Scheduler COM API

      • MsiExec.exe (PID: 3588)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 2564)
      • svchost.exe (PID: 868)
      • MsMpEng.exe (PID: 2512)
      • services.exe (PID: 476)
      • MpCmdRun.exe (PID: 1404)
      • msseces.exe (PID: 2212)
      • mpsigstub.exe (PID: 2844)
      • MpCmdRun.exe (PID: 2668)
      • MpCmdRun.exe (PID: 1756)
      • MpCmdRun.exe (PID: 2948)
      • NisSrv.exe (PID: 3660)
    • Modifies Windows Defender service settings

      • services.exe (PID: 476)
  • SUSPICIOUS

    • Creates files in the program directory

      • epplauncher.exe (PID: 2952)
      • Setup.exe (PID: 2564)
      • MsMpEng.exe (PID: 2512)
      • wermgr.exe (PID: 3204)
      • wermgr.exe (PID: 3968)
      • wermgr.exe (PID: 572)
      • NisSrv.exe (PID: 3660)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2528)
      • MSEInstall.exe (PID: 3288)
      • MsiExec.exe (PID: 3588)
      • msiexec.exe (PID: 3528)
      • Setup.exe (PID: 2564)
      • mpam-c989958d.exe (PID: 3556)
      • msseces.exe (PID: 2212)
      • MsMpEng.exe (PID: 2512)
    • Drops a file with too old compile date

      • MSEInstall.exe (PID: 3288)
      • chrome.exe (PID: 2528)
      • msiexec.exe (PID: 3528)
      • Setup.exe (PID: 2564)
      • mpam-c989958d.exe (PID: 3556)
      • MsMpEng.exe (PID: 2512)
    • Drops a file that was compiled in debug mode

      • chrome.exe (PID: 2528)
      • MSEInstall.exe (PID: 3288)
      • msiexec.exe (PID: 3528)
      • MsiExec.exe (PID: 3588)
      • Setup.exe (PID: 2564)
      • msseces.exe (PID: 2212)
      • mpam-c989958d.exe (PID: 3556)
      • MsMpEng.exe (PID: 2512)
    • Creates files in the driver directory

      • MsiExec.exe (PID: 3588)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 3528)
      • Setup.exe (PID: 2564)
    • Removes files from Windows directory

      • MsiExec.exe (PID: 3588)
      • wermgr.exe (PID: 3204)
      • svchost.exe (PID: 868)
      • wermgr.exe (PID: 572)
      • wermgr.exe (PID: 3968)
    • Creates files in the Windows directory

      • MsiExec.exe (PID: 3588)
      • MpCmdRun.exe (PID: 1404)
      • svchost.exe (PID: 868)
      • Setup.exe (PID: 2564)
      • MpCmdRun.exe (PID: 1756)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 3528)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 3528)
    • Creates or modifies windows services

      • services.exe (PID: 476)
    • Creates files in the user directory

      • Setup.exe (PID: 2564)
    • Creates a software uninstall entry

      • Setup.exe (PID: 2564)
    • Application launched itself

      • MpCmdRun.exe (PID: 2948)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 308)
      • chrome.exe (PID: 2528)
    • Application launched itself

      • chrome.exe (PID: 2528)
      • msiexec.exe (PID: 3528)
    • Creates files in the program directory

      • msiexec.exe (PID: 3528)
    • Reads settings of System Certificates

      • MsMpEng.exe (PID: 2512)
      • chrome.exe (PID: 308)
      • svchost.exe (PID: 868)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 1020)
      • MsiExec.exe (PID: 3588)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3528)
    • Creates or modifies windows services

      • msiexec.exe (PID: 3528)
      • MsiExec.exe (PID: 3588)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
35
Malicious processes
17
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs mseinstall.exe no specs chrome.exe no specs mseinstall.exe epplauncher.exe setup.exe msiexec.exe msiexec.exe no specs msiexec.exe services.exe no specs msmpeng.exe svchost.exe msseces.exe eventcreate.exe no specs mpcmdrun.exe no specs wermgr.exe no specs wermgr.exe no specs mpcmdrun.exe no specs mpcmdrun.exe no specs mpcmdrun.exe wermgr.exe no specs mpam-c989958d.exe mpsigstub.exe no specs nissrv.exe no specs wermgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
2528"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://www.microsoft.com/en-us/download/details.aspx?id=5201"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
3608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6ec2a9d0,0x6ec2a9e0,0x6ec2a9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2540"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1796 --on-initialized-event-handle=316 --parent-handle=320 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
184"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=9426781437721549765 --mojo-platform-channel-handle=1036 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
308"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=14741857333737902058 --mojo-platform-channel-handle=1452 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2584"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12192932103758376922 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2100 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
3072"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3529209720790692931 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1896 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2392"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7945768489946008981 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1260"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=13447762956120366766 --mojo-platform-channel-handle=3276 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
996"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14315973204181927803 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
6 272
Read events
5 254
Write events
986
Delete events
32

Modification events

(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2540) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2528-13253974339581000
Value:
259
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(2528) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
66
Suspicious files
48
Text files
135
Unknown types
18

Dropped files

PID
Process
Filename
Type
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5FEF0844-9E0.pma
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\8b0c0648-043e-40ca-afd1-1e4eb2b9c366.tmp
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:FB5B20517A0D1F7DAD485989565BEE5E
SHA256:99405F66EDBEB2306F4D0B4469DCADFF5293B5E1549C588CCFACEA439BB3B101
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF154271.TMPtext
MD5:FB5B20517A0D1F7DAD485989565BEE5E
SHA256:99405F66EDBEB2306F4D0B4469DCADFF5293B5E1549C588CCFACEA439BB3B101
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF154213.TMPtext
MD5:D4322EEBAC92D1B8F7A6F5E39F6264B7
SHA256:A3EEDF21B850DCC7CE5AE04395ECDD2D29DA4EA549C8A185DD9E8B552A87B8C2
868svchost.exeC:\Windows\appcompat\programs\RecentFileCache.bcftxt
MD5:6534F5B88C7C04BDAF5C8EA10E166F82
SHA256:4F771DBD2CAD230E51CDAFC9AEC8909916160651EC8176C5AA8E19F1EDD28685
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:1C97B70A4BAD7C026F79467C7D496AFA
SHA256:C5A02E4984DE3F30DADFC0A89A93F45418C06653C3962EAA94C93909E51D272D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
38
DNS requests
46
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2212
msseces.exe
GET
302
23.43.214.226:80
http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=0.0.0.0&avdelta=0.0.0.0&asdelta=0.0.0.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094
US
whitelisted
HEAD
200
8.249.251.254:80
http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2101011133
US
whitelisted
HEAD
200
8.249.251.254:80
http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2101011134
US
whitelisted
HEAD
200
8.249.251.254:80
http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2101011134
US
whitelisted
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muredir.cab?2101011134
US
compressed
23.3 Kb
whitelisted
1756
MpCmdRun.exe
GET
302
23.43.214.226:80
http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=0.0.0.0&avdelta=0.0.0.0&asdelta=0.0.0.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094
US
whitelisted
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
whitelisted
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
compressed
22.9 Kb
whitelisted
GET
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
compressed
23.3 Kb
whitelisted
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
compressed
23.3 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
308
chrome.exe
152.199.19.160:443
ajax.aspnetcdn.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
308
chrome.exe
2.21.41.70:443
www.microsoft.com
GTT Communications Inc.
FR
malicious
308
chrome.exe
23.202.229.49:443
img-prod-cms-rt-microsoft-com.akamaized.net
Akamai International B.V.
NL
whitelisted
23.43.219.8:443
assets.onestore.ms
Akamai International B.V.
US
unknown
308
chrome.exe
13.107.246.13:443
wcpstatic.microsoft.com
Microsoft Corporation
US
suspicious
104.84.251.138:443
mem.gfx.ms
Time Warner Cable Internet LLC
US
unknown
308
chrome.exe
23.202.229.48:443
statics-marketingsites-wcus-ms-com.akamaized.net
Akamai International B.V.
NL
unknown
308
chrome.exe
65.55.44.109:443
web.vortex.data.microsoft.com
Microsoft Corporation
US
malicious
308
chrome.exe
172.217.20.77:443
accounts.google.com
Google Inc.
US
whitelisted
308
chrome.exe
92.123.125.249:443
c.s-microsoft.com
CW Vodafone Group PLC
unknown

DNS requests

Domain
IP
Reputation
www.microsoft.com
  • 2.21.41.70
  • 104.78.177.250
whitelisted
accounts.google.com
  • 172.217.20.77
shared
ssl.gstatic.com
  • 172.217.19.195
whitelisted
assets.onestore.ms
  • 23.216.243.55
  • 23.43.219.8
whitelisted
statics-marketingsites-wcus-ms-com.akamaized.net
  • 23.202.229.48
whitelisted
c.s-microsoft.com
  • 92.123.125.249
whitelisted
ajax.aspnetcdn.com
  • 152.199.19.160
whitelisted
wcpstatic.microsoft.com
  • 13.107.246.13
whitelisted
mem.gfx.ms
  • 88.221.11.132
  • 104.84.251.138
whitelisted
az725175.vo.msecnd.net
  • 152.199.19.160
whitelisted

Threats

No threats detected
Process
Message
Setup.exe
Invalid parameter passed to C runtime function.
Setup.exe
Invalid parameter passed to C runtime function.