URL:

https://www.microsoft.com/en-us/download/details.aspx?id=5201

Full analysis: https://app.any.run/tasks/065c76b6-22d1-4854-ab06-daa49d577b0f
Verdict: Malicious activity
Analysis date: January 01, 2021, 11:32:05
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

709F9825AF3E3B27296CA8EB045E5D29

SHA1:

003B4D26CABBBF4186D24AB589BC126FCB4BA4A9

SHA256:

04BAB2E4B80666AC0ADD57951E36C62A688CA263A8953AF56C4563AA686B18FE

SSDEEP:

3:N8DSLZRtRHd4m2EIM/q9T:2OLTDHdKEIR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • epplauncher.exe (PID: 2952)
    • Application was dropped or rewritten from another process

      • MSEInstall.exe (PID: 3288)
      • epplauncher.exe (PID: 2952)
      • MSEInstall.exe (PID: 1928)
      • Setup.exe (PID: 2564)
      • MsMpEng.exe (PID: 2512)
      • msseces.exe (PID: 2212)
      • MpCmdRun.exe (PID: 1404)
      • MpCmdRun.exe (PID: 1756)
      • MpCmdRun.exe (PID: 2668)
      • MpCmdRun.exe (PID: 2948)
      • mpam-c989958d.exe (PID: 3556)
      • mpsigstub.exe (PID: 2844)
      • NisSrv.exe (PID: 3660)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 2564)
      • services.exe (PID: 476)
      • MsMpEng.exe (PID: 2512)
      • svchost.exe (PID: 868)
      • msseces.exe (PID: 2212)
      • MpCmdRun.exe (PID: 1404)
      • MpCmdRun.exe (PID: 2668)
      • MpCmdRun.exe (PID: 2948)
      • MpCmdRun.exe (PID: 1756)
      • mpsigstub.exe (PID: 2844)
      • NisSrv.exe (PID: 3660)
    • Drops executable file immediately after starts

      • MSEInstall.exe (PID: 3288)
      • mpam-c989958d.exe (PID: 3556)
      • mpsigstub.exe (PID: 2844)
    • Loads the Task Scheduler COM API

      • MsiExec.exe (PID: 3588)
    • Modifies Windows Defender service settings

      • services.exe (PID: 476)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2528)
      • MSEInstall.exe (PID: 3288)
      • msiexec.exe (PID: 3528)
      • MsiExec.exe (PID: 3588)
      • Setup.exe (PID: 2564)
      • msseces.exe (PID: 2212)
      • mpam-c989958d.exe (PID: 3556)
      • MsMpEng.exe (PID: 2512)
    • Drops a file that was compiled in debug mode

      • chrome.exe (PID: 2528)
      • MSEInstall.exe (PID: 3288)
      • MsiExec.exe (PID: 3588)
      • msiexec.exe (PID: 3528)
      • Setup.exe (PID: 2564)
      • msseces.exe (PID: 2212)
      • MsMpEng.exe (PID: 2512)
      • mpam-c989958d.exe (PID: 3556)
    • Drops a file with too old compile date

      • chrome.exe (PID: 2528)
      • MSEInstall.exe (PID: 3288)
      • msiexec.exe (PID: 3528)
      • Setup.exe (PID: 2564)
      • mpam-c989958d.exe (PID: 3556)
      • MsMpEng.exe (PID: 2512)
    • Creates files in the program directory

      • epplauncher.exe (PID: 2952)
      • Setup.exe (PID: 2564)
      • MsMpEng.exe (PID: 2512)
      • wermgr.exe (PID: 572)
      • wermgr.exe (PID: 3968)
      • NisSrv.exe (PID: 3660)
      • wermgr.exe (PID: 3204)
    • Creates a directory in Program Files

      • Setup.exe (PID: 2564)
      • msiexec.exe (PID: 3528)
    • Creates files in the driver directory

      • MsiExec.exe (PID: 3588)
    • Creates files in the Windows directory

      • MsiExec.exe (PID: 3588)
      • svchost.exe (PID: 868)
      • Setup.exe (PID: 2564)
      • MpCmdRun.exe (PID: 1404)
      • MpCmdRun.exe (PID: 1756)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 3528)
    • Creates or modifies windows services

      • services.exe (PID: 476)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 3528)
    • Creates a software uninstall entry

      • Setup.exe (PID: 2564)
    • Removes files from Windows directory

      • svchost.exe (PID: 868)
      • MsiExec.exe (PID: 3588)
      • wermgr.exe (PID: 3204)
      • wermgr.exe (PID: 572)
      • wermgr.exe (PID: 3968)
    • Creates files in the user directory

      • Setup.exe (PID: 2564)
    • Application launched itself

      • MpCmdRun.exe (PID: 2948)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2528)
      • chrome.exe (PID: 308)
    • Application launched itself

      • chrome.exe (PID: 2528)
      • msiexec.exe (PID: 3528)
    • Creates files in the program directory

      • msiexec.exe (PID: 3528)
    • Creates or modifies windows services

      • MsiExec.exe (PID: 3588)
      • msiexec.exe (PID: 3528)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 1020)
      • MsiExec.exe (PID: 3588)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3528)
    • Reads settings of System Certificates

      • MsMpEng.exe (PID: 2512)
      • chrome.exe (PID: 308)
      • svchost.exe (PID: 868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
76
Monitored processes
35
Malicious processes
17
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs mseinstall.exe no specs chrome.exe no specs mseinstall.exe epplauncher.exe setup.exe msiexec.exe msiexec.exe no specs msiexec.exe services.exe no specs msmpeng.exe svchost.exe msseces.exe eventcreate.exe no specs mpcmdrun.exe no specs wermgr.exe no specs wermgr.exe no specs mpcmdrun.exe no specs mpcmdrun.exe no specs mpcmdrun.exe wermgr.exe no specs mpam-c989958d.exe mpsigstub.exe no specs nissrv.exe no specs wermgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
184"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=9426781437721549765 --mojo-platform-channel-handle=1036 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
308"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=14741857333737902058 --mojo-platform-channel-handle=1452 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
476C:\Windows\system32\services.exeC:\Windows\System32\services.exewininit.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Services and Controller app
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\services.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\sechost.dll
c:\windows\system32\cryptbase.dll
572"C:\Windows\system32\wermgr.exe" "-outproc" "868" "4912" C:\Windows\system32\wermgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Problem Reporting
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wermgr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
868C:\Windows\system32\svchost.exe -k netsvcsC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
996"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=14315973204181927803 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2872 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1020c:\Windows\system32\MsiExec.exe -Embedding 715C20A0BB91FC5E054DDFF5F8F0C224c:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1260"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1024,12060355708395393656,4422598207642442126,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=13447762956120366766 --mojo-platform-channel-handle=3276 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1404"c:\Program Files\Microsoft Security Client\\MpCmdRun.exe" SignaturesUpdateService -UnmanagedUpdatec:\Program Files\Microsoft Security Client\MpCmdRun.exeMsMpEng.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
0
Version:
4.10.0209.0
Modules
Images
c:\program files\microsoft security client\mpcmdrun.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
1756"c:\Program Files\Microsoft Security Client\\MpCmdRun.exe" SignaturesUpdateService -ScheduleJob -HttpDownload -RestrictPrivileges -Reinvokec:\Program Files\Microsoft Security Client\MpCmdRun.exe
MpCmdRun.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
0
Version:
4.10.0209.0
Modules
Images
c:\program files\microsoft security client\mpcmdrun.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
Total events
6 272
Read events
5 254
Write events
986
Delete events
32

Modification events

(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2540) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2528-13253974339581000
Value:
259
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2528) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(2528) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
66
Suspicious files
48
Text files
135
Unknown types
18

Dropped files

PID
Process
Filename
Type
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5FEF0844-9E0.pma
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\8b0c0648-043e-40ca-afd1-1e4eb2b9c366.tmp
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
868svchost.exeC:\Windows\appcompat\programs\RecentFileCache.bcftxt
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENTtext
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old~RF154281.TMPtext
MD5:
SHA256:
2528chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
38
DNS requests
46
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
whitelisted
1756
MpCmdRun.exe
GET
302
23.43.214.226:80
http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=0.0.0.0&avdelta=0.0.0.0&asdelta=0.0.0.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094
US
whitelisted
HEAD
200
8.249.251.254:80
http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2101011134
US
whitelisted
2212
msseces.exe
GET
302
23.43.214.226:80
http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=0.0.0.0&avdelta=0.0.0.0&asdelta=0.0.0.0&prod=EDB4FA23-53B8-4AFA-8C5D-99752CCA7094
US
whitelisted
GET
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
compressed
23.3 Kb
whitelisted
HEAD
200
8.249.251.254:80
http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2101011133
US
whitelisted
GET
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muredir.cab?2101011134
US
compressed
22.9 Kb
whitelisted
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
compressed
23.3 Kb
whitelisted
HEAD
200
8.249.251.254:80
http://download.windowsupdate.com/v9/windowsupdate/redir/muv4wuredir.cab?2101011134
US
whitelisted
HEAD
200
13.107.4.50:80
http://ds.download.windowsupdate.com/v11/2/microsoftupdate/redir/v6-legacy-muauth.cab?2101011134
US
compressed
22.9 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
308
chrome.exe
2.21.41.70:443
www.microsoft.com
GTT Communications Inc.
FR
malicious
308
chrome.exe
152.199.19.160:443
ajax.aspnetcdn.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
308
chrome.exe
13.107.246.13:443
wcpstatic.microsoft.com
Microsoft Corporation
US
suspicious
308
chrome.exe
172.217.19.195:443
ssl.gstatic.com
Google Inc.
US
whitelisted
308
chrome.exe
23.202.229.48:443
statics-marketingsites-wcus-ms-com.akamaized.net
Akamai International B.V.
NL
unknown
308
chrome.exe
92.123.125.249:443
c.s-microsoft.com
CW Vodafone Group PLC
unknown
23.43.219.8:443
assets.onestore.ms
Akamai International B.V.
US
unknown
308
chrome.exe
172.217.20.106:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
308
chrome.exe
65.55.44.109:443
web.vortex.data.microsoft.com
Microsoft Corporation
US
malicious
308
chrome.exe
23.40.112.130:443
download.microsoft.com
TELECOM ITALIA SPARKLE S.p.A.
NL
malicious

DNS requests

Domain
IP
Reputation
www.microsoft.com
  • 2.21.41.70
  • 104.78.177.250
whitelisted
accounts.google.com
  • 172.217.20.77
shared
ssl.gstatic.com
  • 172.217.19.195
whitelisted
assets.onestore.ms
  • 23.216.243.55
  • 23.43.219.8
whitelisted
statics-marketingsites-wcus-ms-com.akamaized.net
  • 23.202.229.48
whitelisted
c.s-microsoft.com
  • 92.123.125.249
whitelisted
ajax.aspnetcdn.com
  • 152.199.19.160
whitelisted
wcpstatic.microsoft.com
  • 13.107.246.13
whitelisted
mem.gfx.ms
  • 88.221.11.132
  • 104.84.251.138
whitelisted
az725175.vo.msecnd.net
  • 152.199.19.160
whitelisted

Threats

No threats detected
Process
Message
Setup.exe
Invalid parameter passed to C runtime function.
Setup.exe
Invalid parameter passed to C runtime function.