URL:

http://familynet.shop.samsung.com/familynet

Full analysis: https://app.any.run/tasks/d802fd07-0d6c-409a-b78b-34a73f2f4a87
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 19, 2020, 03:47:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

4FD7A4FC0BD19C3C8A858F2810DE3395

SHA1:

F73804F93DB9DD0D8D913318F6613A0AED098930

SHA256:

55F1630527FB1C13B740639B6FE9DA8D70C9D9B01456134BF9CB17DE0307F0FD

SSDEEP:

3:N1KYuW4LWhWeYCF:CYZBhWeNF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • MaWebSAFER_STDEP.exe (PID: 4004)
      • MaWebSAFER_STDEP.exe (PID: 552)
      • install.exe (PID: 2488)
      • MaRPackCheck.exe (PID: 1944)
      • vcredist_x86.exe (PID: 2976)
      • IMGSF50Svc.exe (PID: 2532)
      • markany_ImageSafer_v5.0.exe (PID: 3592)
      • IMGSF50Svc.exe (PID: 2908)
      • IMGSF50Start_x86.exe (PID: 3868)
      • IMGSF50Svc.exe (PID: 2000)
    • Downloads executable files from the Internet

      • MaRPackCheck.exe (PID: 1944)
    • Loads dropped or rewritten executable

      • install.exe (PID: 2488)
      • markany_ImageSafer_v5.0.exe (PID: 3592)
      • IMGSF50Start_x86.exe (PID: 3868)
      • iexplore.exe (PID: 2740)
      • iexplore.exe (PID: 3748)
      • svchost.exe (PID: 592)
      • svchost.exe (PID: 668)
      • MaWebSAFER_STDEP.exe (PID: 552)
      • DllHost.exe (PID: 3616)
    • Changes settings of System certificates

      • IEInstal.exe (PID: 608)
  • SUSPICIOUS

    • Executed via COM

      • IEInstal.exe (PID: 608)
      • DllHost.exe (PID: 3616)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3748)
      • MaWebSAFER_STDEP.exe (PID: 552)
      • vcredist_x86.exe (PID: 2976)
      • MaRPackCheck.exe (PID: 1944)
      • markany_ImageSafer_v5.0.exe (PID: 3592)
    • Reads Internet Cache Settings

      • IEInstal.exe (PID: 608)
      • MaRPackCheck.exe (PID: 1944)
    • Creates files in the Windows directory

      • MaWebSAFER_STDEP.exe (PID: 552)
      • markany_ImageSafer_v5.0.exe (PID: 3592)
    • Removes files from Windows directory

      • MaWebSAFER_STDEP.exe (PID: 552)
    • Executed as Windows Service

      • IMGSF50Svc.exe (PID: 2000)
    • Creates COM task schedule object

      • MaWebSAFER_STDEP.exe (PID: 552)
    • Creates files in the program directory

      • MaWebSAFER_STDEP.exe (PID: 552)
    • Creates a software uninstall entry

      • MaWebSAFER_STDEP.exe (PID: 552)
    • Adds / modifies Windows certificates

      • IEInstal.exe (PID: 608)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3748)
      • iexplore.exe (PID: 2740)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2740)
    • Changes internet zones settings

      • iexplore.exe (PID: 3748)
    • Creates files in the user directory

      • iexplore.exe (PID: 3748)
      • iexplore.exe (PID: 2740)
    • Reads settings of System Certificates

      • IEInstal.exe (PID: 608)
      • iexplore.exe (PID: 2740)
      • iexplore.exe (PID: 3748)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3748)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3748)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3748)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
67
Monitored processes
17
Malicious processes
8
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe ieinstal.exe no specs mawebsafer_stdep.exe no specs mawebsafer_stdep.exe marpackcheck.exe vcredist_x86.exe install.exe no specs madepcheck.exe markany_imagesafer_v5.0.exe imgsf50svc.exe no specs imgsf50svc.exe no specs imgsf50svc.exe no specs imgsf50start_x86.exe no specs svchost.exe no specs svchost.exe no specs Called Class

Process information

PID
CMD
Path
Indicators
Parent process
552"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\MaWebSAFER_STDEP.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\MaWebSAFER_STDEP.exe
iexplore.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\mawebsafer_stdep.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
592C:\Windows\system32\svchost.exe -k DcomLaunchC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpnpmgr.dll
c:\windows\system32\spinf.dll
c:\windows\system32\user32.dll
608"C:\Program Files\Internet Explorer\IEInstal.exe" -EmbeddingC:\Program Files\Internet Explorer\IEInstal.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer Add-on Installer
Exit code:
2147942402
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\ieinstal.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
668C:\Windows\system32\svchost.exe -k RPCSSC:\Windows\System32\svchost.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\rpcepmap.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\secur32.dll
1944C:\Windows\system32\MaRPackCheck.exeC:\Windows\system32\MaRPackCheck.exe
MaWebSAFER_STDEP.exe
User:
admin
Company:
markany
Integrity Level:
HIGH
Description:
MaRPackCheck
Exit code:
0
Version:
1, 0, 0, 4
Modules
Images
c:\windows\system32\marpackcheck.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2000C:\Windows\IMGSF50Svc.exeC:\Windows\IMGSF50Svc.exeservices.exe
User:
SYSTEM
Company:
MarkAny
Integrity Level:
SYSTEM
Description:
Image SAFER 5.0 Session Managing Service for x86
Exit code:
0
Version:
5.0.20.204
Modules
Images
c:\windows\imgsf50svc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2488c:\80ebb1310ac5688ba8\.\install.exe /qc:\80ebb1310ac5688ba8\install.exevcredist_x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
External Installer
Exit code:
0
Version:
9.0.30729.4148 built by: QFE
Modules
Images
c:\80ebb1310ac5688ba8\install.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
2532C:\Windows\IMGSF50Svc.exe -installC:\Windows\IMGSF50Svc.exemarkany_ImageSafer_v5.0.exe
User:
admin
Company:
MarkAny
Integrity Level:
HIGH
Description:
Image SAFER 5.0 Session Managing Service for x86
Exit code:
0
Version:
5.0.20.204
Modules
Images
c:\windows\imgsf50svc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2740"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3748 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2908C:\Windows\IMGSF50Svc.exe -startC:\Windows\IMGSF50Svc.exemarkany_ImageSafer_v5.0.exe
User:
admin
Company:
MarkAny
Integrity Level:
HIGH
Description:
Image SAFER 5.0 Session Managing Service for x86
Exit code:
0
Version:
5.0.20.204
Modules
Images
c:\windows\imgsf50svc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
8 000
Read events
1 394
Write events
4 871
Delete events
1 735

Modification events

(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
1533444886
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30813584
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000A1000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3748) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
46
Suspicious files
23
Text files
66
Unknown types
13

Dropped files

PID
Process
Filename
Type
2740iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabDADF.tmp
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarDAE0.tmp
MD5:
SHA256:
3748iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cder
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\font[1].csstext
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ULZ9K377.txttext
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\icons.data.svg[1].csstext
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cbinary
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\fn;jsessionid=B27563F83B1C3E62897A959FE7840318-m1[1].htmhtml
MD5:
SHA256:
2740iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\customerticketingaddon[1].csstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
39
DNS requests
13
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2740
iexplore.exe
GET
302
23.45.239.198:80
http://familynet.shop.samsung.com/familynet
NL
whitelisted
2740
iexplore.exe
GET
302
23.45.239.198:80
http://familynet.shop.samsung.com/familynet/login/fn;jsessionid=B27563F83B1C3E62897A959FE7840318-m1.app18
NL
whitelisted
2740
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPJvUY%2Bsl%2Bj4yzQuAcL2oQno5fCgQUUWj%2FkK8CB3U8zNllZGKiErhZcjsCEAOPuhhExf%2FsVJFE7QZHAuU%3D
US
der
471 b
whitelisted
2740
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D
US
der
471 b
whitelisted
2740
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEATh56TcXPLzbcArQrhdFZ8%3D
US
der
471 b
whitelisted
3748
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
3748
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
3748
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
3748
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
1944
MaRPackCheck.exe
GET
200
2.18.233.19:80
http://download.microsoft.com/download/9/7/7/977B481A-7BA6-4E30-AC40-ED51EB2028F2/vcredist_x86.exe
unknown
executable
4.28 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2740
iexplore.exe
23.45.239.198:80
familynet.shop.samsung.com
Akamai International B.V.
NL
unknown
2740
iexplore.exe
23.45.239.198:443
familynet.shop.samsung.com
Akamai International B.V.
NL
unknown
2740
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
204.79.197.200:80
familynet.shop.samsung.com
Microsoft Corporation
US
whitelisted
3748
iexplore.exe
23.45.239.198:443
familynet.shop.samsung.com
Akamai International B.V.
NL
unknown
1944
MaRPackCheck.exe
2.18.233.19:80
download.microsoft.com
Akamai International B.V.
whitelisted
3748
iexplore.exe
204.79.197.200:443
familynet.shop.samsung.com
Microsoft Corporation
US
whitelisted
3748
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3748
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2740
iexplore.exe
35.181.91.36:443
smetrics.samsung.com
CA
suspicious

DNS requests

Domain
IP
Reputation
familynet.shop.samsung.com
  • 23.45.239.198
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
assets.adobedtm.com
  • 2.18.232.23
whitelisted
cdn.samsung.com
  • 2.18.232.119
whitelisted
smetrics.samsung.com
  • 15.188.31.119
  • 35.181.91.36
  • 15.188.105.205
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
download.microsoft.com
  • 2.18.233.19
whitelisted

Threats

PID
Process
Class
Message
1944
MaRPackCheck.exe
A Network Trojan was detected
ET MALWARE User-Agent (HTTP)
1944
MaRPackCheck.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
MaDEPCheck.exe
DEP does not Installed
MaWebSAFER_STDEP.exe
### INIT...
DllHost.exe
### INIT...