URL:

http://update.send-anywhere.com/downloads/SendAnywhereSetup.exe

Full analysis: https://app.any.run/tasks/722f32a4-60be-4826-86a6-266ee5690ac1
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 08, 2024, 09:45:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
arch-doc
nodejs
Indicators:
MD5:

0ABC3CE4E70D7D53819C4BE6FD796884

SHA1:

5094D4D150067516E5608C3C6225FC830D78F2B9

SHA256:

D83B70629ABB4B908C052BA2B6D7B056291E4894AB4D422C1157FB91001FB893

SSDEEP:

3:N1KLQRAjvSeKaKXKuPNyvL4A:CU6SeKauPNuL4A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • chrome.exe (PID: 2720)
    • Executable content was dropped or overwritten

      • SendAnywhereSetup.exe (PID: 2256)
      • VC_redist.x86.exe (PID: 3896)
      • VC_redist.x86.exe (PID: 3688)
      • vc_redist.x86.exe (PID: 1228)
      • vc_redist.x86.exe (PID: 3304)
      • VC_redist.x86.exe (PID: 1908)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • SendAnywhereSetup.exe (PID: 2256)
    • Drops 7-zip archiver for unpacking

      • SendAnywhereSetup.exe (PID: 2256)
    • Process drops legitimate windows executable

      • SendAnywhereSetup.exe (PID: 2256)
      • VC_redist.x86.exe (PID: 1908)
      • msiexec.exe (PID: 2380)
      • VC_redist.x86.exe (PID: 3688)
      • vc_redist.x86.exe (PID: 1228)
      • vc_redist.x86.exe (PID: 3304)
    • Application launched itself

      • VC_redist.x86.exe (PID: 3896)
      • VC_redist.x86.exe (PID: 1616)
      • Send Anywhere.exe (PID: 3936)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 2380)
    • Starts a Microsoft application from unusual location

      • vc_redist.x86.exe (PID: 3304)
      • VC_redist.x86.exe (PID: 1908)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3676)
    • Starts itself from another location

      • vc_redist.x86.exe (PID: 3304)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2248)
      • cmd.exe (PID: 2444)
    • Starts CMD.EXE for commands execution

      • Send Anywhere.exe (PID: 3936)
  • INFO

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 3744)
      • msiexec.exe (PID: 2380)
      • chrome.exe (PID: 2896)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3036)
      • Send Anywhere.exe (PID: 3936)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3036)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3036)
    • The process uses the downloaded file

      • chrome.exe (PID: 1820)
      • chrome.exe (PID: 3744)
    • Application launched itself

      • chrome.exe (PID: 3744)
    • Node.js compiler has been detected

      • Send Anywhere.exe (PID: 1132)
      • Send Anywhere.exe (PID: 2888)
      • Send Anywhere.exe (PID: 2296)
      • Send Anywhere.exe (PID: 2664)
      • Send Anywhere.exe (PID: 3940)
      • Send Anywhere.exe (PID: 2316)
      • Send Anywhere.exe (PID: 3936)
      • Send Anywhere.exe (PID: 2988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
87
Monitored processes
46
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmpnscfg.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sendanywheresetup.exe no specs sendanywheresetup.exe vc_redist.x86.exe vc_redist.x86.exe vc_redist.x86.exe chrome.exe no specs vssvc.exe no specs msiexec.exe vc_redist.x86.exe no specs vc_redist.x86.exe vc_redist.x86.exe THREAT send anywhere.exe chrome.exe THREAT send anywhere.exe no specs cmd.exe no specs reg.exe no specs THREAT send anywhere.exe THREAT send anywhere.exe no specs THREAT send anywhere.exe no specs cmd.exe no specs THREAT send anywhere.exe no specs reg.exe no specs THREAT send anywhere.exe no specs THREAT send anywhere.exe no specs chrome.exe no specs chrome.exe no specs send anywhere.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
976"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=1516 --field-trial-handle=1164,i,17511565917876833389,16479392252096114831,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1132"C:\Program Files\Send Anywhere\Send Anywhere.exe" --type=renderer --field-trial-handle=1208,7507144610916169140,17850765777610219215,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --disable-gpu-compositing --lang=en-US --app-path="C:\Program Files\Send Anywhere\resources\app.asar" --node-integration --webview-tag --enable-sandbox --enable-remote-module --background-color=#fff --enable-websql --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2632 /prefetch:1C:\Program Files\Send Anywhere\Send Anywhere.exe
Send Anywhere.exe
User:
admin
Company:
Estmob Inc.
Integrity Level:
LOW
Description:
Send Anywhere
Version:
24.3.80853.2146
Modules
Images
c:\program files\send anywhere\send anywhere.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\send anywhere\ffmpeg.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1228"C:\Program Files\Send Anywhere\vc_redist.x86.exe" /install /quiet /norestartC:\Program Files\Send Anywhere\vc_redist.x86.exe
SendAnywhereSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.38.33130
Exit code:
3010
Version:
14.38.33130.0
Modules
Images
c:\program files\send anywhere\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1260"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3868 --field-trial-handle=1164,i,17511565917876833389,16479392252096114831,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1324REG DELETE "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v SendAnywhere /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1600"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=736 --field-trial-handle=1164,i,17511565917876833389,16479392252096114831,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1616"C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={2cfeba4a-21f8-4ea7-9927-c5a5c6f13cc9} -burn.filehandle.self=820 -burn.embedded BurnPipe.{C68743F3-6539-44B4-A19F-B2CCA99F774C} {B47BBF11-78EF-4C75-A1D7-9D9EFC23B8C1} 1908C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exeVC_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1652"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6e7e8b38,0x6e7e8b48,0x6e7e8b54C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1820"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3964 --field-trial-handle=1164,i,17511565917876833389,16479392252096114831,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1908"C:\Windows\Temp\{76213E0E-0444-42E6-A4E9-A51DFE7D1E70}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{B278AF5D-0F09-4B02-B8F0-6F8DCFD81729} {6B8156E0-5701-448C-BC59-4E59E5CE3D67} 3304C:\Windows\Temp\{76213E0E-0444-42E6-A4E9-A51DFE7D1E70}\.be\VC_redist.x86.exe
vc_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.38.33130
Exit code:
3010
Version:
14.38.33130.0
Modules
Images
c:\windows\temp\{76213e0e-0444-42e6-a4e9-a51dfe7d1e70}\.be\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
33 144
Read events
32 039
Write events
748
Delete events
357

Modification events

(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3744) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
105
Suspicious files
233
Text files
324
Unknown types
4

Dropped files

PID
Process
Filename
Type
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF22d636.TMP
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.oldtext
MD5:5CB0B2845A3BDF2304E7CEA61A3FC51E
SHA256:0A73277FE3C683BCACFCF2658568C9D750AB78F56A4DEA9FBD563AA5D67EC666
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF22d636.TMPtext
MD5:825B582C78EC88D54C215EFDF1EAD639
SHA256:367995D01A8F13E5C30C79499F86B034775BFD009D83DC97635DE438D47DFA37
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF22d636.TMPtext
MD5:456D3EF989973A7C218E338A6CFFAD25
SHA256:75631D994431F254B94255C50038A3657BFC45D76FCE9D794D514E57CA678872
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:46DCF7DB72970F06A3B4803F7064C6E6
SHA256:179243BCC118729AE487E1CADCF2C0976413903B97CF5B5DA985D0D60B60716A
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1bfb32f7-a304-4c41-88e0-036197d7d576.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old~RF22daf9.TMP
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\LOG.old
MD5:
SHA256:
3744chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:1C6BD9993E8ECB91342E78927D81DCA3
SHA256:76BE6BB39D2B3287BCBBCF6465599F0CF66FE5B9F4F55D10ED38B0BCF1A4BEC3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
54
DNS requests
37
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
844
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
2720
chrome.exe
GET
200
13.35.58.17:80
http://update.send-anywhere.com/downloads/SendAnywhereSetup.exe
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
844
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acvebl5hyowh6yyy3wmoaw5wbfpa_4.10.2830.100/oimompecagnajdejgnnjijobebaeigek_4.10.2830.100_win32_acmfn7n2mz6vs4wnlypsmq4uakaq.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
3744
chrome.exe
239.255.255.250:1900
whitelisted
2720
chrome.exe
74.125.133.84:443
accounts.google.com
GOOGLE
US
whitelisted
2720
chrome.exe
13.35.58.17:80
update.send-anywhere.com
US
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
3744
chrome.exe
224.0.0.251:5353
unknown
2720
chrome.exe
142.250.186.164:443
www.google.com
GOOGLE
US
whitelisted
2720
chrome.exe
142.250.186.142:443
sb-ssl.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.142
whitelisted
update.send-anywhere.com
  • 13.35.58.17
  • 13.35.58.110
  • 13.35.58.88
  • 13.35.58.32
whitelisted
accounts.google.com
  • 74.125.133.84
whitelisted
www.google.com
  • 142.250.186.164
whitelisted
sb-ssl.google.com
  • 142.250.186.142
whitelisted
www.googleapis.com
  • 142.250.181.234
  • 142.250.185.74
  • 142.250.186.74
  • 142.250.186.106
  • 142.250.185.170
  • 142.250.185.202
  • 172.217.18.10
  • 172.217.16.138
  • 142.250.186.138
  • 172.217.18.106
  • 172.217.16.202
  • 142.250.184.202
  • 142.250.185.138
  • 142.250.186.42
  • 142.250.185.234
  • 142.250.186.170
whitelisted
update.googleapis.com
  • 142.250.185.99
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
clients1.google.com
  • 216.58.206.46
whitelisted
send-anywhere.com
  • 18.172.112.127
  • 18.172.112.43
  • 18.172.112.88
  • 18.172.112.6
whitelisted

Threats

PID
Process
Class
Message
2720
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1060
svchost.exe
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (send-anywhere .com)
2256
SendAnywhereSetup.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (send-anywhere .com)
2256
SendAnywhereSetup.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (send-anywhere .com)
2256
SendAnywhereSetup.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (send-anywhere .com)
2256
SendAnywhereSetup.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (send-anywhere .com)
1060
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
1060
svchost.exe
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (send-anywhere .com)
2296
Send Anywhere.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (send-anywhere .com)
Process
Message
msiexec.exe
Failed to release Service