File name:

ChromeSetup.exe

Full analysis: https://app.any.run/tasks/d0fb8153-c487-4615-9e32-0c453fea2342
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 28, 2021, 04:11:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

05709B20B99EA37FD6D758191066A06F

SHA1:

24F594ABA349ED021E701EB5DC02EF83F6366E9D

SHA256:

9868412A60106BE7FBA8A0317D31381894B4CFD586BA3A3EC17C7C8116F77036

SSDEEP:

24576:/sGoPM9jkPd17jwfYl7jy0hslMQwKQnjr51uTiZxv879kENIdLwN4ZASFD:OM9QPdxwfE7WlFwKAfzuTiDFUFk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • ChromeSetup.exe (PID: 2516)
      • GoogleUpdateSetup.exe (PID: 2396)
      • GoogleUpdate.exe (PID: 2564)
      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
    • Loads dropped or rewritten executable

      • GoogleUpdate.exe (PID: 3700)
      • GoogleUpdate.exe (PID: 2564)
      • GoogleUpdate.exe (PID: 3404)
      • GoogleUpdate.exe (PID: 3280)
      • GoogleUpdate.exe (PID: 3760)
      • GoogleUpdate.exe (PID: 1936)
      • GoogleUpdate.exe (PID: 556)
      • GoogleUpdate.exe (PID: 2240)
      • GoogleUpdate.exe (PID: 3000)
      • svchost.exe (PID: 676)
      • chrome.exe (PID: 2752)
      • chrome.exe (PID: 2804)
      • chrome.exe (PID: 3664)
      • chrome.exe (PID: 3816)
      • chrome.exe (PID: 1908)
      • chrome.exe (PID: 3040)
      • chrome.exe (PID: 2092)
      • chrome.exe (PID: 3984)
      • chrome.exe (PID: 2664)
      • chrome.exe (PID: 3576)
      • chrome.exe (PID: 308)
      • chrome.exe (PID: 1964)
      • chrome.exe (PID: 3672)
      • chrome.exe (PID: 468)
      • chrome.exe (PID: 2596)
      • chrome.exe (PID: 3956)
      • chrome.exe (PID: 588)
      • chrome.exe (PID: 3580)
      • chrome.exe (PID: 3088)
      • chrome.exe (PID: 3364)
      • chrome.exe (PID: 1208)
      • chrome.exe (PID: 444)
      • chrome.exe (PID: 4028)
      • chrome.exe (PID: 2900)
      • chrome.exe (PID: 3160)
      • chrome.exe (PID: 3352)
      • chrome.exe (PID: 2352)
      • chrome.exe (PID: 3056)
      • chrome.exe (PID: 2488)
      • chrome.exe (PID: 2880)
    • Application was dropped or rewritten from another process

      • GoogleUpdate.exe (PID: 3700)
      • GoogleUpdate.exe (PID: 2564)
      • setup.exe (PID: 1828)
      • setup.exe (PID: 376)
      • GoogleCrashHandler.exe (PID: 2316)
      • GoogleUpdateOnDemand.exe (PID: 2524)
      • chrome.exe (PID: 2752)
      • chrome.exe (PID: 3664)
      • chrome.exe (PID: 2804)
      • chrome.exe (PID: 3816)
      • chrome.exe (PID: 3672)
      • chrome.exe (PID: 2664)
      • chrome.exe (PID: 3576)
      • chrome.exe (PID: 3040)
      • chrome.exe (PID: 3984)
      • chrome.exe (PID: 2092)
      • chrome.exe (PID: 1964)
      • chrome.exe (PID: 308)
      • chrome.exe (PID: 1908)
      • chrome.exe (PID: 3956)
      • chrome.exe (PID: 2596)
      • chrome.exe (PID: 4028)
      • chrome.exe (PID: 588)
      • chrome.exe (PID: 468)
      • chrome.exe (PID: 3088)
      • chrome.exe (PID: 3364)
      • chrome.exe (PID: 444)
      • chrome.exe (PID: 1208)
      • chrome.exe (PID: 3580)
      • chrome.exe (PID: 2900)
      • chrome.exe (PID: 3160)
      • chrome.exe (PID: 3352)
      • chrome.exe (PID: 2352)
      • chrome.exe (PID: 3056)
      • chrome.exe (PID: 2488)
      • chrome.exe (PID: 2976)
      • chrome.exe (PID: 2880)
    • Loads the Task Scheduler COM API

      • GoogleUpdate.exe (PID: 2564)
    • Changes settings of System certificates

      • GoogleUpdate.exe (PID: 3760)
    • Actions looks like stealing of personal data

      • setup.exe (PID: 1828)
      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
    • Changes the autorun value in the registry

      • setup.exe (PID: 1828)
  • SUSPICIOUS

    • Drops a file that was compiled in debug mode

      • ChromeSetup.exe (PID: 2516)
      • GoogleUpdateSetup.exe (PID: 2396)
      • GoogleUpdate.exe (PID: 2564)
      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
      • setup.exe (PID: 1828)
    • Creates files in the program directory

      • GoogleUpdateSetup.exe (PID: 2396)
      • GoogleUpdate.exe (PID: 2564)
      • GoogleUpdate.exe (PID: 556)
      • setup.exe (PID: 1828)
      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
    • Executable content was dropped or overwritten

      • ChromeSetup.exe (PID: 2516)
      • GoogleUpdateSetup.exe (PID: 2396)
      • GoogleUpdate.exe (PID: 2564)
      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
      • setup.exe (PID: 1828)
    • Creates a directory in Program Files

      • GoogleUpdateSetup.exe (PID: 2396)
      • GoogleUpdate.exe (PID: 2564)
      • GoogleUpdate.exe (PID: 556)
      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
      • setup.exe (PID: 1828)
    • Disables SEHOP

      • GoogleUpdate.exe (PID: 2564)
    • Creates/Modifies COM task schedule object

      • GoogleUpdate.exe (PID: 3280)
    • Adds / modifies Windows certificates

      • GoogleUpdate.exe (PID: 3760)
    • Executed as Windows Service

      • GoogleUpdate.exe (PID: 556)
    • Creates files in the Windows directory

      • GoogleUpdate.exe (PID: 556)
    • Drops a file with a compile date too recent

      • 91.0.4472.77_chrome_installer.exe (PID: 3724)
      • setup.exe (PID: 1828)
    • Application launched itself

      • setup.exe (PID: 1828)
      • GoogleUpdate.exe (PID: 556)
    • Drops a file with too old compile date

      • setup.exe (PID: 1828)
    • Changes default file association

      • setup.exe (PID: 1828)
    • Searches for installed software

      • setup.exe (PID: 1828)
    • Creates a software uninstall entry

      • setup.exe (PID: 1828)
    • Removes files from Windows directory

      • setup.exe (PID: 1828)
    • Executed via COM

      • GoogleUpdateOnDemand.exe (PID: 2524)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2752)
  • INFO

    • Reads settings of System Certificates

      • GoogleUpdate.exe (PID: 556)
      • chrome.exe (PID: 2752)
    • Dropped object may contain Bitcoin addresses

      • setup.exe (PID: 1828)
    • Reads the hosts file

      • chrome.exe (PID: 2752)
      • chrome.exe (PID: 3816)
    • Application launched itself

      • chrome.exe (PID: 2752)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

LanguageId: en
ProductVersion: 1.3.36.82
ProductName: Google Update
OriginalFileName: GoogleUpdateSetup.exe
LegalCopyright: Copyright 2018 Google LLC
InternalName: Google Update Setup
FileVersion: 1.3.36.82
FileDescription: Google Update Setup
CompanyName: Google LLC
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.3.36.82
FileVersionNumber: 1.3.36.82
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x4f17
UninitializedDataSize: -
InitializedDataSize: 1203712
CodeSize: 83456
LinkerVersion: 14.2
PEType: PE32
TimeStamp: 2021:04:13 04:39:59+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 13-Apr-2021 02:39:59
Detected languages:
  • Arabic - Saudi Arabia
  • Bulgarian - Bulgaria
  • Catalan - Spain
  • Chinese - PRC
  • Chinese - Taiwan
  • Croatian - Croatia
  • Czech - Czech Republic
  • Danish - Denmark
  • Dutch - Netherlands
  • English - United Kingdom
  • English - United States
  • Estonian - Estonia
  • Farsi - Iran
  • Finnish - Finland
  • French - France
  • German - Germany
  • Greek - Greece
  • Gujarati - India
  • Hebrew - Israel
  • Hindi - India
  • Hungarian - Hungary
  • Icelandic - Iceland
  • Indonesian - Indonesia (Bahasa)
  • Italian - Italy
  • Japanese - Japan
  • Kannada - India (Kannada script)
  • Korean - Korea
  • Latvian - Latvia
  • Lithuanian - Lithuania
  • Malay - Malaysia
  • Marathi - India
  • Norwegian - Norway (Bokmal)
  • Polish - Poland
  • Portuguese - Brazil
  • Portuguese - Portugal
  • Romanian - Romania
  • Russian - Russia
  • Serbian - Serbia (Cyrillic)
  • Slovak - Slovakia
  • Slovenian - Slovenia
  • Spanish - Mexico
  • Spanish - Spain (International sort)
  • Swahili - Kenya
  • Swedish - Sweden
  • Tamil - India
  • Telugu - India (Telugu script)
  • Thai - Thailand
  • Turkish - Turkey
  • Ukrainian - Ukraine
  • Urdu - Pakistan
  • Vietnamese - Viet Nam
Debug artifacts:
  • TEST_mi_exe_stub.pdb
CompanyName: Google LLC
FileDescription: Google Update Setup
FileVersion: 1.3.36.82
InternalName: Google Update Setup
LegalCopyright: Copyright 2018 Google LLC
OriginalFilename: GoogleUpdateSetup.exe
ProductName: Google Update
ProductVersion: 1.3.36.82
LanguageId: en

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 13-Apr-2021 02:39:59
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0001442F
0x00014600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.65568
.rdata
0x00016000
0x00006DAC
0x00006E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.26346
.data
0x0001D000
0x00001290
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.99865
.rsrc
0x0001F000
0x0011D278
0x0011D400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.98663
.reloc
0x0013D000
0x000010E0
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.37311

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.20417
1166
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
2
4.13669
1384
Latin 1 / Western European
English - United States
RT_ICON
3
3.91985
744
Latin 1 / Western European
English - United States
RT_ICON
4
4.83772
2216
Latin 1 / Western European
English - United States
RT_ICON
5
3.68656
1640
Latin 1 / Western European
English - United States
RT_ICON
6
4.50268
3752
Latin 1 / Western European
English - United States
RT_ICON
101
2.86669
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
102
7.99983
1134988
Latin 1 / Western European
UNKNOWN
B
1321
3.68352
426
Latin 1 / Western European
Serbian - Serbia (Cyrillic)
RT_STRING

Imports

KERNEL32.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
89
Monitored processes
48
Malicious processes
10
Suspicious processes
16

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start chromesetup.exe googleupdate.exe no specs googleupdatesetup.exe googleupdate.exe googleupdate.exe no specs googleupdate.exe no specs googleupdate.exe googleupdate.exe no specs googleupdate.exe 91.0.4472.77_chrome_installer.exe setup.exe setup.exe no specs googlecrashhandler.exe no specs googleupdate.exe googleupdateondemand.exe no specs googleupdate.exe no specs svchost.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
308"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1092,15254327879206913639,10830494311945042242,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3624 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\91.0.4472.77\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
376"C:\Program Files\Google\Update\Install\{23458DC4-59FD-46C2-BAD7-B1C6C91A91CA}\CR_BBFB7.tmp\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=91.0.4472.77 --initial-client-data=0x18c,0x190,0x194,0x160,0x198,0x1570f40,0x1570f50,0x1570f5cC:\Program Files\Google\Update\Install\{23458DC4-59FD-46C2-BAD7-B1C6C91A91CA}\CR_BBFB7.tmp\setup.exesetup.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\update\install\{23458dc4-59fd-46c2-bad7-b1c6c91a91ca}\cr_bbfb7.tmp\setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\shell32.dll
444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1092,15254327879206913639,10830494311945042242,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\91.0.4472.77\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
468"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1092,15254327879206913639,10830494311945042242,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\91.0.4472.77\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
556"C:\Program Files\Google\Update\GoogleUpdate.exe" /svcC:\Program Files\Google\Update\GoogleUpdate.exe
services.exe
User:
SYSTEM
Company:
Google Inc.
Integrity Level:
SYSTEM
Description:
Google Installer
Exit code:
0
Version:
1.3.33.23
Modules
Images
c:\program files\google\update\googleupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
588"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1092,15254327879206913639,10830494311945042242,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4432 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\91.0.4472.77\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
676C:\Windows\system32\svchost.exe -k RPCSSC:\Windows\System32\svchost.exeservices.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\rpcepmap.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\secur32.dll
1208"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1092,15254327879206913639,10830494311945042242,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2564 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\91.0.4472.77\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1828"C:\Program Files\Google\Update\Install\{23458DC4-59FD-46C2-BAD7-B1C6C91A91CA}\CR_BBFB7.tmp\setup.exe" --install-archive="C:\Program Files\Google\Update\Install\{23458DC4-59FD-46C2-BAD7-B1C6C91A91CA}\CR_BBFB7.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Windows\TEMP\gui5F0D.tmp"C:\Program Files\Google\Update\Install\{23458DC4-59FD-46C2-BAD7-B1C6C91A91CA}\CR_BBFB7.tmp\setup.exe
91.0.4472.77_chrome_installer.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\update\install\{23458dc4-59fd-46c2-bad7-b1c6c91a91ca}\cr_bbfb7.tmp\setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\shell32.dll
1908"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1092,15254327879206913639,10830494311945042242,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1996 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
91.0.4472.77
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\91.0.4472.77\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
4 164
Read events
1 311
Write events
2 703
Delete events
150

Modification events

(PID) Process:(2564) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
1
(PID) Process:(2564) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:delete valueName:usagestats
Value:
0
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update
Operation:writeName:uid
Value:
{4A8ACE12-EE80-4DB7-B85F-C3872B6E8C42}
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update
Operation:writeName:uid-create-time
Value:
1622175087
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update
Operation:writeName:uid-num-rotations
Value:
1
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\uid
Operation:writeName:EgMzSgSv
Value:
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}
Operation:delete keyName:(default)
Value:
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}
Operation:writeName:(default)
Value:
ServiceModule
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\GoogleUpdate.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(3404) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\GoogleUpdate.exe
Operation:writeName:AppID
Value:
{4EB61BAC-A3B6-4760-9581-655041EF4D69}
Executable files
227
Suspicious files
40
Text files
271
Unknown types
71

Dropped files

PID
Process
Filename
Type
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\GoogleUpdateBroker.exeexecutable
MD5:89FEFC3ADC50F2011E60A797B1618873
SHA256:ACFF2C8DB3632907D19CE2A909711C27ED55586B8CA091CF83BD9CB72E592EB2
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\goopdateres_de.dllexecutable
MD5:DA46EBAF3961DF89D355EAF6FA6268A4
SHA256:14B5F6C69C33C45246307609645A9400AEEC8A4E4DDB8BF5CFC8CCCC2621E5C4
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\GoogleCrashHandler.exeexecutable
MD5:36CB86775385DE4D906CC13B712486FC
SHA256:6D67FC790835B85E7B14DEF65958D9B30E0F6E6BC6D4EAD40960A3CA993353ED
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\goopdate.dllexecutable
MD5:5E6DC676B85A50207CDF415152D931B6
SHA256:AC655D1723AC9835C05EC9271388AC23D7981B954B1F0375B02D3D9614676CB5
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\psuser_64.dllexecutable
MD5:CBE66CD31B6CA9093F4BCEE21BE4E7B1
SHA256:0492325599D6F0FDEC1BA8F1CC717A495485DEFB7BBDB447AB9D0051A26BA041
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\GoogleUpdateOnDemand.exeexecutable
MD5:3B91E89E7627F3D19BD2E2257D7EDFC2
SHA256:A2753C7F8E4169722C118EAFFE0620C7BB4EF486A60E9B8C3FB98AE4697FC132
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\GoogleUpdateComRegisterShell64.exeexecutable
MD5:E8F2A11072991C7849F1B5A3B06E0B0E
SHA256:EADAF98F6E10EDDD93A5AE75F06016CB28C2C26D59A33C2DB9C1A3324246DBB1
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\GoogleUpdate.exeexecutable
MD5:9A66A3DE2589F7108426AF37AB7F6B41
SHA256:A913415626433D5D0F07D3EC4084A67FF6F5138C3C3F64E36DD0C1AE4C423C65
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\psuser.dllexecutable
MD5:4E5D1F133D87FC4D129B5A32AEA8E363
SHA256:75BE2D68097F0141C011EC40555DC64884B0E7E41C38BBE8901C82D8AC16185F
2516ChromeSetup.exeC:\Users\admin\AppData\Local\Temp\GUM7A98.tmp\psmachine.dllexecutable
MD5:BE763342E179E358569BECAE5DFCB2EE
SHA256:814395410BB2B3CA82A9B9B77AC55BE068034BA092E6FD2F5CCF488F089121C0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
33
DNS requests
21
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/OBWmYNHq7JtH92_3Ap0Zyw_91.0.4472.77/91.0.4472.77_chrome_installer.exe
US
whitelisted
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APVOrL1aIZFPVuxAFYGUnkE_20210520.375400399/L4APQhV-L7wXVB0n1jC4gg
US
whitelisted
HEAD
302
142.250.181.238:80
http://redirector.gvt1.com/edgedl/release2/chrome_component/e-LpHKPS3xMMvr05gM79Fw_20210524/MWlTgyZNznpgf37yIM9q5w
US
whitelisted
HEAD
200
74.125.97.72:80
http://r3---sn-aigzrnld.gvt1.com/edgedl/release2/chrome_component/e-LpHKPS3xMMvr05gM79Fw_20210524/MWlTgyZNznpgf37yIM9q5w?cms_redirect=yes&mh=-B&mip=46.244.28.15&mm=28&mn=sn-aigzrnld&ms=nvh&mt=1622174899&mv=m&mvi=3&pl=24&shardbypass=yes
US
whitelisted
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/OBWmYNHq7JtH92_3Ap0Zyw_91.0.4472.77/91.0.4472.77_chrome_installer.exe
US
executable
70.3 Mb
whitelisted
3816
chrome.exe
GET
302
142.250.181.238:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
518 b
whitelisted
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APVOrL1aIZFPVuxAFYGUnkE_20210520.375400399/L4APQhV-L7wXVB0n1jC4gg
US
binary
5.74 Kb
whitelisted
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APVOrL1aIZFPVuxAFYGUnkE_20210520.375400399/L4APQhV-L7wXVB0n1jC4gg
US
binary
183 Kb
whitelisted
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APVOrL1aIZFPVuxAFYGUnkE_20210520.375400399/L4APQhV-L7wXVB0n1jC4gg
US
binary
7.28 Kb
whitelisted
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APVOrL1aIZFPVuxAFYGUnkE_20210520.375400399/L4APQhV-L7wXVB0n1jC4gg
US
binary
91.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3816
chrome.exe
142.250.185.163:443
update.googleapis.com
Google Inc.
US
whitelisted
3816
chrome.exe
142.250.181.238:80
redirector.gvt1.com
Google Inc.
US
whitelisted
3816
chrome.exe
216.58.212.129:443
clients2.googleusercontent.com
Google Inc.
US
whitelisted
3760
GoogleUpdate.exe
142.250.186.99:443
update.googleapis.com
Google Inc.
US
whitelisted
556
GoogleUpdate.exe
142.250.186.99:443
update.googleapis.com
Google Inc.
US
whitelisted
34.104.35.123:80
edgedl.me.gvt1.com
US
whitelisted
2240
GoogleUpdate.exe
142.250.185.163:443
update.googleapis.com
Google Inc.
US
whitelisted
3816
chrome.exe
142.250.184.206:443
clients2.google.com
Google Inc.
US
whitelisted
3816
chrome.exe
216.58.212.173:443
accounts.google.com
Google Inc.
US
whitelisted
3816
chrome.exe
216.58.212.132:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
update.googleapis.com
  • 142.250.186.99
  • 142.250.185.163
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
clientservices.googleapis.com
  • 142.250.181.227
whitelisted
clients2.google.com
  • 142.250.184.206
whitelisted
accounts.google.com
  • 216.58.212.173
shared
www.google.com
  • 216.58.212.132
malicious
www.gstatic.com
  • 142.250.185.67
whitelisted
apis.google.com
  • 142.250.186.78
whitelisted
ogs.google.com
  • 216.58.212.174
whitelisted
ssl.gstatic.com
  • 142.250.186.131
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
2 ETPRO signatures available at the full report
No debug info