URL:

https://www.techsmith.com/download/snagit/?utm_source=trial&utm_medium=email&utm_content=sndl&utm_campaign=snagit&spMailingID=58092606&spUserID=MzkzNDAzNjY0MzIxS0&spJobID=1580440473&spReportId=MTU4MDQxMjY5OAS2

Full analysis: https://app.any.run/tasks/72a13352-5c47-44b9-b063-4f63ca4800bf
Verdict: Malicious activity
Analysis date: February 04, 2019, 14:50:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

A66581124CFB66D81C2F18BF534E8C94

SHA1:

DC3FFDFB3E80266EAB2942C8D57C651BCDF44FBF

SHA256:

21EAE0859C24FAADBFD93BE6B809B0C465F7A55F5E8AAA54FB274B9FA1410318

SSDEEP:

6:2OLrE88NiWTsSQdXJDhNmAxrv8leyfK2kAVT008H:2P88RpQdZDDmqoleyC2kwOH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • snagit.exe (PID: 2536)
      • snagit.exe (PID: 2840)
      • snagit.exe (PID: 4084)
      • snagit.exe (PID: 3936)
      • snagit.exe (PID: 3196)
      • snagit.exe (PID: 2428)
      • snagit.exe (PID: 1604)
      • snagit (2).exe (PID: 3284)
      • Bootstrapper.exe (PID: 640)
      • snagit.exe (PID: 2320)
      • ExtraSteps.exe (PID: 3608)
    • Loads dropped or rewritten executable

      • snagit.exe (PID: 3936)
      • snagit.exe (PID: 4084)
      • snagit.exe (PID: 2428)
      • snagit.exe (PID: 1604)
      • snagit (2).exe (PID: 3284)
      • rundll32.exe (PID: 3380)
      • rundll32.exe (PID: 4020)
      • regsvr32.exe (PID: 3600)
      • Snagit32.exe (PID: 2296)
      • spoolsv.exe (PID: 1196)
      • SnagitPI.exe (PID: 3104)
      • MsiExec.exe (PID: 676)
      • Snagit32.exe (PID: 3736)
      • Snagit32.exe (PID: 3496)
      • regsvr32.exe (PID: 1144)
      • Snagit32.exe (PID: 2156)
    • Changes the autorun value in the registry

      • Bootstrapper.exe (PID: 640)
    • Starts NET.EXE for service management

      • regsvr32.exe (PID: 1144)
    • Registers / Runs the DLL via REGSVR32.EXE

      • msiexec.exe (PID: 2264)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2984)
      • snagit.exe (PID: 4084)
      • snagit.exe (PID: 2536)
      • snagit.exe (PID: 2840)
      • snagit.exe (PID: 3936)
      • snagit.exe (PID: 2428)
      • snagit.exe (PID: 3196)
      • snagit.exe (PID: 2320)
      • snagit.exe (PID: 1604)
      • snagit (2).exe (PID: 2308)
      • snagit (2).exe (PID: 3284)
      • Bootstrapper.exe (PID: 640)
      • rundll32.exe (PID: 3380)
      • SnagitPI.exe (PID: 3104)
      • spoolsv.exe (PID: 1196)
      • Snagit32.exe (PID: 2296)
      • msiexec.exe (PID: 2264)
    • Starts Internet Explorer

      • snagit.exe (PID: 4084)
      • Snagit32.exe (PID: 3736)
    • Starts itself from another location

      • snagit (2).exe (PID: 3284)
    • Creates files in the program directory

      • Bootstrapper.exe (PID: 640)
      • TSCUpdClt.exe (PID: 3092)
      • SearchIndexer.exe (PID: 3588)
      • Snagit32.exe (PID: 2296)
      • UploaderService.exe (PID: 2168)
    • Uses RUNDLL32.EXE to load library

      • MsiExec.exe (PID: 3832)
    • Changes IE settings (feature browser emulation)

      • msiexec.exe (PID: 2264)
    • Modifies the open verb of a shell class

      • msiexec.exe (PID: 2264)
      • MsiExec.exe (PID: 3832)
    • Searches for installed software

      • Bootstrapper.exe (PID: 640)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 2264)
    • Creates COM task schedule object

      • MsiExec.exe (PID: 360)
      • MsiExec.exe (PID: 676)
      • regsvr32.exe (PID: 3428)
      • regsvr32.exe (PID: 1144)
      • regsvr32.exe (PID: 3600)
    • Creates a software uninstall entry

      • Bootstrapper.exe (PID: 640)
    • Removes files from Windows directory

      • SnagitPI.exe (PID: 3104)
      • spoolsv.exe (PID: 1196)
    • Creates files in the Windows directory

      • spoolsv.exe (PID: 1196)
      • SnagitPI.exe (PID: 3104)
    • Creates files in the user directory

      • Snagit32.exe (PID: 2296)
      • Snagit32.exe (PID: 3736)
    • Reads Environment values

      • Snagit32.exe (PID: 2296)
      • Snagit32.exe (PID: 3736)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 4012)
      • iexplore.exe (PID: 3520)
    • Creates files in the user directory

      • iexplore.exe (PID: 2940)
      • iexplore.exe (PID: 1732)
      • iexplore.exe (PID: 3520)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 2324)
    • Application launched itself

      • iexplore.exe (PID: 4012)
      • chrome.exe (PID: 2984)
      • msiexec.exe (PID: 2264)
      • iexplore.exe (PID: 3520)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 4012)
      • iexplore.exe (PID: 3520)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 4012)
      • chrome.exe (PID: 2984)
      • iexplore.exe (PID: 2940)
      • iexplore.exe (PID: 1732)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 4012)
      • DrvInst.exe (PID: 3856)
    • Changes settings of System certificates

      • iexplore.exe (PID: 4012)
      • DrvInst.exe (PID: 3856)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2524)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2264)
      • Snagit32.exe (PID: 3736)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2264)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1732)
    • Creates files in the program directory

      • msiexec.exe (PID: 2264)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
112
Monitored processes
64
Malicious processes
18
Suspicious processes
5

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs snagit.exe snagit.exe chrome.exe no specs chrome.exe no specs snagit.exe snagit.exe chrome.exe no specs iexplore.exe iexplore.exe chrome.exe no specs chrome.exe no specs snagit.exe snagit.exe explorer.exe no specs snagit.exe snagit.exe rundll32.exe no specs snagit (2).exe snagit (2).exe bootstrapper.exe vssvc.exe no specs drvinst.exe no specs msiexec.exe msiexec.exe no specs rundll32.exe rundll32.exe no specs tscupdclt.exe no specs tscupdclt.exe no specs uploaderservice.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs regsvr32.exe no specs regsvr32.exe no specs net.exe net1.exe no specs net.exe net1.exe no specs searchindexer.exe no specs searchprotocolhost.exe no specs searchfilterhost.exe no specs regsvr32.exe snagitpi.exe uploaderservice.exe no specs snagit32.exe spoolsv.exe snagit32.exe tscupdclt.exe no specs extrasteps.exe no specs snagit32.exe snagpriv.exe no specs snagpriv.exe searchprotocolhost.exe no specs snagit32.exe iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
256"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Downloads\snagitC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
304"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2988 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\68.0.3440.106\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
360"C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\TechSmith\Snagit 2019\SnagitET.dll"C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
640"C:\Users\admin\AppData\Local\Temp\{5CE155F4-2610-4463-9AD9-C036DF8BBB92}\.be\Bootstrapper.exe" -q -burn.elevated BurnPipe.{C6E58FAD-2FDB-42D8-AD89-B300FA3FC0C6} {CB566C97-C6E0-4610-92DD-CC28374A3264} 3284C:\Users\admin\AppData\Local\Temp\{5CE155F4-2610-4463-9AD9-C036DF8BBB92}\.be\Bootstrapper.exe
snagit (2).exe
User:
admin
Company:
TechSmith Corporation
Integrity Level:
HIGH
Description:
Snagit 2019
Exit code:
0
Version:
19.1.0.2653
Modules
Images
c:\users\admin\appdata\local\temp\{5ce155f4-2610-4463-9ad9-c036df8bbb92}\.be\bootstrapper.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
676"C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\TechSmith\Snagit 2019\AnimatedGIFSource.dll"C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
872C:\Windows\system32\net1 stop wsearch /yC:\Windows\system32\net1.exenet.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Net Command
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
940C:\Windows\system32\MsiExec.exe -Embedding A071A55EF418D5D9E1A16ABB17DC31C1 M Global\MSI0000C:\Windows\system32\MsiExec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1144regsvr32.exe /s "C:\Program Files\TechSmith\Snagit 2019\PdfProperty.dll"C:\Windows\system32\regsvr32.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1196C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Spooler SubSystem App
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\spoolsv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1604"C:\Users\admin\AppData\Local\Temp\{7588768E-4B27-47CB-93F8-E70910F2FA0D}\.cr\snagit.exe" -burn.clean.room="C:\Users\admin\Downloads\snagit.exe" -burn.filehandle.attached=148 -burn.filehandle.self=156 C:\Users\admin\AppData\Local\Temp\{7588768E-4B27-47CB-93F8-E70910F2FA0D}\.cr\snagit.exe
snagit.exe
User:
admin
Company:
TechSmith Corporation
Integrity Level:
MEDIUM
Description:
Snagit 2019
Exit code:
0
Version:
19.1.0.2653
Modules
Images
c:\users\admin\appdata\local\temp\{7588768e-4b27-47cb-93f8-e70910f2fa0d}\.cr\snagit.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
8 511
Read events
4 647
Write events
3 645
Delete events
219

Modification events

(PID) Process:(304) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2984-13193765462398250
Value:
259
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3516-13180984670829101
Value:
0
(PID) Process:(2984) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2984-13193765462398250
Value:
259
(PID) Process:(2984) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
333
Suspicious files
4 276
Text files
496
Unknown types
81

Dropped files

PID
Process
Filename
Type
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\2e5ed6a7-327d-44ce-b7c1-e08e013b1c7e.tmp
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\70e1a6f8-f6fd-431f-bafc-6245c8a6c602.tmp
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF20e9d7.TMPtext
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old~RF20e999.TMPtext
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.oldtext
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF20e9d7.TMPtext
MD5:
SHA256:
2984chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
75
DNS requests
53
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2984
chrome.exe
GET
184.31.86.228:80
http://download.techsmith.com/snagit/enu/snagit.exe
NL
suspicious
2984
chrome.exe
GET
200
2.16.186.56:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
compressed
55.2 Kb
whitelisted
2984
chrome.exe
GET
200
52.85.188.251:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2984
chrome.exe
172.217.21.227:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
2984
chrome.exe
45.60.124.187:443
www.techsmith.com
US
unknown
2984
chrome.exe
172.217.23.141:443
accounts.google.com
Google Inc.
US
whitelisted
2984
chrome.exe
23.38.53.224:443
use.typekit.net
Akamai International B.V.
NL
whitelisted
2984
chrome.exe
184.31.86.228:443
assets.techsmith.com
Akamai International B.V.
NL
whitelisted
2984
chrome.exe
52.85.188.203:443
d1f8f9xcsvx3ha.cloudfront.net
Amazon.com, Inc.
US
unknown
2984
chrome.exe
18.204.70.187:443
techsmith.onfastspring.com
US
unknown
2984
chrome.exe
152.199.19.160:443
az416426.vo.msecnd.net
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2984
chrome.exe
216.58.207.72:443
www.googletagmanager.com
Google Inc.
US
whitelisted
2984
chrome.exe
151.101.0.143:443
s.swiftypecdn.com
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.21.227
whitelisted
www.techsmith.com
  • 45.60.124.187
unknown
www.gstatic.com
  • 216.58.207.67
whitelisted
accounts.google.com
  • 172.217.23.141
shared
use.typekit.net
  • 23.38.53.224
whitelisted
d1f8f9xcsvx3ha.cloudfront.net
  • 52.85.188.203
  • 52.85.188.4
  • 52.85.188.206
  • 52.85.188.83
whitelisted
assets.techsmith.com
  • 184.31.86.228
whitelisted
techsmith.onfastspring.com
  • 18.204.70.187
  • 52.7.156.40
unknown
www.googletagmanager.com
  • 216.58.207.72
whitelisted
az416426.vo.msecnd.net
  • 152.199.19.160
whitelisted

Threats

PID
Process
Class
Message
2984
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2984
chrome.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
Process
Message
regsvr32.exe
***L_AllocThreadData
regsvr32.exe
***InitThreadData
regsvr32.exe
***L_FreeThreadData
Snagit32.exe
***L_AllocThreadData
Snagit32.exe
***InitThreadData
Snagit32.exe
***L_FreeThreadData
Snagit32.exe
***L_AllocThreadData
Snagit32.exe
***InitThreadData
Snagit32.exe
***L_AllocThreadData @濮҆轄鸠벙ǔ濂҆***L_AllocThreadData
Snagit32.exe
***L_AllocThreadData