File name:

0cb54dfd343604c515e918626a9f4ff1.exe

Full analysis: https://app.any.run/tasks/b862ae69-e4aa-4ab8-a7fb-5d19c9fc98bf
Verdict: Malicious activity
Analysis date: April 08, 2025, 10:39:16
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

0CB54DFD343604C515E918626A9F4FF1

SHA1:

1C8BDD72922C8F450602B58B1E26222A9BED1098

SHA256:

192A90DD8982A000C42AAA8BA496B0585D0067207DBCA95376D975DFA8B0A0E9

SSDEEP:

98304:TcOk2efVTg2kO6D7smWxayLMNeNKyftbLiwJeWXhDQEq4jjDA4DJW0qbVeZ8g0pW:B2x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • setup.exe (PID: 3020)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7372)
      • updater.exe (PID: 7532)
    • Application launched itself

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7372)
      • updater.exe (PID: 7532)
      • updater.exe (PID: 7684)
      • updater.exe (PID: 7880)
      • setup.exe (PID: 3020)
      • setup.exe (PID: 6516)
    • Executes as Windows Service

      • updater.exe (PID: 7684)
      • updater.exe (PID: 7880)
    • Executable content was dropped or overwritten

      • updater.exe (PID: 7532)
      • updater.exe (PID: 7684)
      • 135.0.7049.42_chrome_installer.exe (PID: 1852)
      • setup.exe (PID: 3020)
    • Searches for installed software

      • setup.exe (PID: 3020)
    • Creates a software uninstall entry

      • setup.exe (PID: 3020)
  • INFO

    • Checks supported languages

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7372)
      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7508)
      • updater.exe (PID: 7568)
      • updater.exe (PID: 7732)
      • updater.exe (PID: 7880)
      • updater.exe (PID: 7532)
      • updater.exe (PID: 7684)
      • updater.exe (PID: 7900)
      • setup.exe (PID: 7484)
      • 135.0.7049.42_chrome_installer.exe (PID: 1852)
      • setup.exe (PID: 3020)
      • setup.exe (PID: 6516)
      • setup.exe (PID: 6744)
      • elevation_service.exe (PID: 2148)
    • Reads the computer name

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7372)
      • updater.exe (PID: 7532)
      • updater.exe (PID: 7684)
      • updater.exe (PID: 7880)
      • 135.0.7049.42_chrome_installer.exe (PID: 1852)
      • setup.exe (PID: 3020)
      • setup.exe (PID: 6516)
      • elevation_service.exe (PID: 2148)
    • Process checks computer location settings

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7372)
    • The sample compiled with english language support

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7372)
      • updater.exe (PID: 7684)
      • 135.0.7049.42_chrome_installer.exe (PID: 1852)
      • setup.exe (PID: 3020)
    • Creates files in the program directory

      • 0cb54dfd343604c515e918626a9f4ff1.exe (PID: 7508)
      • updater.exe (PID: 7568)
      • updater.exe (PID: 7532)
      • updater.exe (PID: 7684)
      • setup.exe (PID: 3020)
      • setup.exe (PID: 6516)
      • updater.exe (PID: 7880)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 7532)
      • updater.exe (PID: 7684)
      • updater.exe (PID: 7880)
    • Reads the software policy settings

      • updater.exe (PID: 7532)
      • updater.exe (PID: 7880)
    • Reads the machine GUID from the registry

      • updater.exe (PID: 7880)
      • updater.exe (PID: 7532)
    • Checks proxy server information

      • updater.exe (PID: 7532)
    • Creates files or folders in the user directory

      • updater.exe (PID: 7532)
    • Create files in a temporary directory

      • updater.exe (PID: 7532)
    • Application launched itself

      • chrome.exe (PID: 4040)
    • Manual execution by a user

      • chrome.exe (PID: 4040)
    • Executes as Windows Service

      • elevation_service.exe (PID: 2148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:15 03:02:05+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 2859008
InitializedDataSize: 6035456
UninitializedDataSize: -
EntryPoint: 0x14c620
OSVersion: 10
ImageVersion: -
SubsystemVersion: 10
Subsystem: Windows GUI
FileVersionNumber: 128.0.6597.0
ProductVersionNumber: 128.0.6597.0
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Google LLC
FileDescription: Google Chrome Installer
FileVersion: 128.0.6597.0
InternalName: Google Chrome
LegalCopyright: Copyright 2024 Google LLC. All rights reserved.
ProductName: Google Chrome Installer
ProductVersion: 128.0.6597.0
CompanyShortName: Google
ProductShortName: Chrome Installer
LastChange: 1b78adace7d1f96d78dbe62440528477f723b004-refs/branch-heads/6597@{#1}
OfficialBuild: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
30
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 0cb54dfd343604c515e918626a9f4ff1.exe no specs 0cb54dfd343604c515e918626a9f4ff1.exe updater.exe updater.exe no specs sppextcomobj.exe no specs slui.exe updater.exe updater.exe no specs updater.exe updater.exe no specs 135.0.7049.42_chrome_installer.exe setup.exe setup.exe no specs setup.exe no specs setup.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe elevation_service.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1932,i,7265646545650747191,18114555492851143752,262144 --variations-seed-version --mojo-platform-channel-handle=1928 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
680"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=135.0.7049.42 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffc89751ca8,0x7ffc89751cb4,0x7ffc89751cc0C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1096"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=1932,i,7265646545650747191,18114555492851143752,262144 --variations-seed-version --mojo-platform-channel-handle=4136 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.42\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=1932,i,7265646545650747191,18114555492851143752,262144 --variations-seed-version --mojo-platform-channel-handle=3304 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.42\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1852"C:\WINDOWS\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\135.0.7049.42_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\2ffe70d9-2c17-415d-bf26-c9e51e1e3f09.tmp"C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\135.0.7049.42_chrome_installer.exe
updater.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Chrome Installer
Exit code:
0
Version:
135.0.7049.42
Modules
Images
c:\windows\systemtemp\chrome_unpacker_beginunzipping7880_428682937\135.0.7049.42_chrome_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
2096"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --field-trial-handle=1932,i,7265646545650747191,18114555492851143752,262144 --variations-seed-version --mojo-platform-channel-handle=2388 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.42\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2148"C:\Program Files\Google\Chrome\Application\135.0.7049.42\elevation_service.exe"C:\Program Files\Google\Chrome\Application\135.0.7049.42\elevation_service.exeservices.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Chrome
Exit code:
0
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\135.0.7049.42\elevation_service.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2552"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=1932,i,7265646545650747191,18114555492851143752,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\135.0.7049.42\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3020"C:\WINDOWS\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\CR_29F13.tmp\setup.exe" --install-archive="C:\WINDOWS\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\CR_29F13.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\2ffe70d9-2c17-415d-bf26-c9e51e1e3f09.tmp"C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\CR_29F13.tmp\setup.exe
135.0.7049.42_chrome_installer.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Chrome Installer
Exit code:
0
Version:
135.0.7049.42
Modules
Images
c:\windows\systemtemp\chrome_unpacker_beginunzipping7880_428682937\cr_29f13.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4040"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installerC:\Program Files\Google\Chrome\Application\chrome.exeexplorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
135.0.7049.42
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
4 888
Read events
4 700
Write events
159
Delete events
29

Modification events

(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
128.0.6597.0
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:writeName:pv
Value:
128.0.6597.0
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:writeName:pv
Value:
128.0.6597.0
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}
Operation:delete keyName:(default)
Value:
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\Elevation
Operation:delete keyName:(default)
Value:
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\LocalServer32
Operation:delete keyName:(default)
Value:
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\ProgID
Operation:delete keyName:(default)
Value:
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\VersionIndependentProgID
Operation:delete keyName:(default)
Value:
(PID) Process:(7684) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{534F5323-3569-4F42-919D-1E1CF93E5BF6}
Operation:delete keyName:(default)
Value:
Executable files
9
Suspicious files
57
Text files
51
Unknown types
2

Dropped files

PID
Process
Filename
Type
75080cb54dfd343604c515e918626a9f4ff1.exeC:\Windows\SystemTemp\Google7508_66125704\UPDATER.PACKED.7Z
MD5:
SHA256:
7532updater.exeC:\Program Files (x86)\Google\GoogleUpdater\updater.logtext
MD5:FC0739B4990CC66EC009D387FEC88EB4
SHA256:9747E683B0C306E58DF55220EE0C59ACEB4FBA09FA4C356BC727AC8DB7169ED9
7532updater.exeC:\Program Files (x86)\Google\GoogleUpdater\914c0416-b195-4a44-80ac-05f5c35ad31c.tmpbinary
MD5:7B693A82168C33EC9E8CF276859DDF7F
SHA256:84A9A7F43DB56CD6E9A408F88244E8BA5EFBE48A5B5168D321F112B8C8FD8E3F
7532updater.exeC:\Program Files (x86)\Google\GoogleUpdater\128.0.6597.0\uninstall.cmdtext
MD5:FBC297EE9060D4256192E4EDB98CAD1B
SHA256:099592FFA867124D16C0C6D868AF1214FD2B7180FA76E4EEE01ABF2A5CF8F044
7532updater.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:4A90329071AE30B759D279CCA342B0A6
SHA256:4F544379EDA8E2653F71472AB968AEFD6B5D1F4B3CE28A5EDB14196184ED3B60
7880updater.exeC:\Windows\SystemTemp\chrome_url_fetcher_7880_806423998\-8a69d345-d564-463c-aff1-a69d9e530f96-_135.0.7049.42_all_cuk66uzd5ats4t4a35bp2tlncy.crx3
MD5:
SHA256:
7880updater.exeC:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping7880_428682937\135.0.7049.42_chrome_installer.exe
MD5:
SHA256:
7684updater.exeC:\Program Files (x86)\Google\GoogleUpdater\daed71e6-4f84-42f7-a826-14652550adbf.tmpbinary
MD5:FE493C7028E00B36B842F612692DBD25
SHA256:6338A0549E1AC903691CDD7817ECE75B3A10A64D626E26CC406CBCF362EDB676
7684updater.exeC:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RF10c7c6.TMPbinary
MD5:7B693A82168C33EC9E8CF276859DDF7F
SHA256:84A9A7F43DB56CD6E9A408F88244E8BA5EFBE48A5B5168D321F112B8C8FD8E3F
7684updater.exeC:\Program Files (x86)\Google\GoogleUpdater\prefs.jsonbinary
MD5:FE493C7028E00B36B842F612692DBD25
SHA256:6338A0549E1AC903691CDD7817ECE75B3A10A64D626E26CC406CBCF362EDB676
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
23
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7532
updater.exe
GET
200
142.250.186.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
7532
updater.exe
GET
200
142.250.186.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7532
updater.exe
GET
200
172.217.23.99:80
http://o.pki.goog/we2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEQCaWeNpIFSBzAkvnnFNzwtC
unknown
whitelisted
7880
updater.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/acccrui2b2bja6neuzbuntycaxkq_135.0.7049.42/-8a69d345-d564-463c-aff1-a69d9e530f96-_135.0.7049.42_all_cuk66uzd5ats4t4a35bp2tlncy.crx3
unknown
whitelisted
6040
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6040
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4268
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2112
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7880
updater.exe
142.250.185.67:443
update.googleapis.com
GOOGLE
US
whitelisted
7532
updater.exe
142.250.185.206:443
dl.google.com
GOOGLE
US
whitelisted
7532
updater.exe
142.250.186.131:80
c.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.20
  • 23.216.77.25
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
update.googleapis.com
  • 142.250.185.67
whitelisted
dl.google.com
  • 142.250.185.206
whitelisted
c.pki.goog
  • 142.250.186.131
whitelisted
o.pki.goog
  • 172.217.23.99
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
login.live.com
  • 20.190.159.129
  • 40.126.31.130
  • 40.126.31.128
  • 20.190.159.2
  • 20.190.159.64
  • 40.126.31.0
  • 20.190.159.4
  • 40.126.31.131
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted

Threats

No threats detected
No debug info