URL:

https://get13.pulsebrowser.net/MTAwNDg3NDMwfHZPT0RjV2F1NnZMcU1KRWx8MTc2ODM4NDIyMQ

Full analysis: https://app.any.run/tasks/09890d35-6247-4e8c-902d-8d209e0d5c1c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 14, 2026, 10:03:16
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
arch-exec
Indicators:
MD5:

AE56CE7EBB0E23F106AA4D3302C5E2F2

SHA1:

EB7E400CD8A8CC7F760284DF94D9692CD5FABD22

SHA256:

B5F2962F357DE6E8593535087B111C0AA53ECB79328213008B8375DBDFB5909C

SSDEEP:

3:N8hxVcH1/JSrP1owt/7V36L83yAytro0n:22DSr1p/7UL83yAUrpn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • updater.exe (PID: 5788)
  • SUSPICIOUS

    • Application launched itself

      • updater.exe (PID: 5788)
      • updater.exe (PID: 2688)
      • updater.exe (PID: 7424)
      • setup.exe (PID: 8688)
      • setup.exe (PID: 9120)
      • pulsebrowser.exe (PID: 9204)
      • pulsebrowser.exe (PID: 5604)
      • pulsebrowser.exe (PID: 7452)
    • Executable content was dropped or overwritten

      • updater.exe (PID: 5788)
      • updater.exe (PID: 2688)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • setup.exe (PID: 8688)
    • Reads security settings of Internet Explorer

      • updater.exe (PID: 5788)
      • pulsebrowser.exe (PID: 5604)
    • Searches for installed software

      • setup.exe (PID: 8688)
    • Connects to unusual port

      • pulsebrowser.exe (PID: 8596)
  • INFO

    • Checks supported languages

      • setup.exe (PID: 7612)
      • updater.exe (PID: 6456)
      • updater.exe (PID: 2688)
      • updater.exe (PID: 2480)
      • updater.exe (PID: 7424)
      • updater.exe (PID: 3500)
      • TextInputHost.exe (PID: 2364)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • notification_helper.exe (PID: 9048)
      • setup.exe (PID: 8688)
      • setup.exe (PID: 8712)
      • pulsebrowser.exe (PID: 6296)
      • setup.exe (PID: 9144)
      • pulsebrowser.exe (PID: 9204)
      • pulsebrowser.exe (PID: 5604)
      • pulsebrowser.exe (PID: 7452)
      • setup.exe (PID: 9120)
      • pulsebrowser.exe (PID: 8468)
      • pulsebrowser.exe (PID: 8596)
      • pulsebrowser.exe (PID: 8972)
      • pulsebrowser.exe (PID: 9028)
      • pulsebrowser.exe (PID: 9068)
      • pulsebrowser.exe (PID: 7232)
      • pulsebrowser.exe (PID: 3544)
      • pulsebrowser.exe (PID: 7496)
      • pulsebrowser.exe (PID: 7552)
      • pulsebrowser.exe (PID: 5600)
      • pulsebrowser.exe (PID: 1520)
      • pulsebrowser.exe (PID: 8716)
      • updater.exe (PID: 5788)
    • Launching a file from the Downloads directory

      • chrome.exe (PID: 7616)
    • The sample compiled with english language support

      • chrome.exe (PID: 7616)
      • setup.exe (PID: 7612)
      • updater.exe (PID: 5788)
      • updater.exe (PID: 2688)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • setup.exe (PID: 8688)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 7616)
    • Creates files or folders in the user directory

      • updater.exe (PID: 6456)
      • updater.exe (PID: 5788)
      • updater.exe (PID: 2688)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • setup.exe (PID: 8688)
      • updater.exe (PID: 7424)
      • setup.exe (PID: 9120)
      • notification_helper.exe (PID: 9048)
      • pulsebrowser.exe (PID: 5604)
      • pulsebrowser.exe (PID: 9204)
      • pulsebrowser.exe (PID: 8596)
    • Launching a file from a Registry key

      • updater.exe (PID: 5788)
    • Reads the computer name

      • updater.exe (PID: 2688)
      • updater.exe (PID: 7424)
      • TextInputHost.exe (PID: 2364)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • setup.exe (PID: 8688)
      • notification_helper.exe (PID: 9048)
      • setup.exe (PID: 9120)
      • pulsebrowser.exe (PID: 9204)
      • pulsebrowser.exe (PID: 5604)
      • pulsebrowser.exe (PID: 7452)
      • pulsebrowser.exe (PID: 8468)
      • pulsebrowser.exe (PID: 8596)
      • pulsebrowser.exe (PID: 7496)
      • updater.exe (PID: 5788)
      • setup.exe (PID: 7612)
    • Checks proxy server information

      • updater.exe (PID: 5788)
      • updater.exe (PID: 7424)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • pulsebrowser.exe (PID: 5604)
    • Reads the machine GUID from the registry

      • updater.exe (PID: 5788)
      • pulsebrowser.exe (PID: 5604)
    • Create files in a temporary directory

      • updater.exe (PID: 7424)
      • pulsebrowser_installer_140.0.7339.197.exe (PID: 8520)
      • setup.exe (PID: 7612)
      • pulsebrowser.exe (PID: 5604)
    • Creates a software uninstall entry

      • setup.exe (PID: 8688)
    • Application launched itself

      • chrome.exe (PID: 7616)
    • Process checks computer location settings

      • pulsebrowser.exe (PID: 5604)
      • pulsebrowser.exe (PID: 9068)
      • pulsebrowser.exe (PID: 8972)
      • pulsebrowser.exe (PID: 1520)
    • Reads CPU info

      • pulsebrowser.exe (PID: 5604)
    • Manual execution by a user

      • notepad.exe (PID: 7476)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7476)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
199
Monitored processes
53
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs setup.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs chrome.exe no specs textinputhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pulsebrowser_installer_140.0.7339.197.exe chrome.exe no specs setup.exe setup.exe no specs chrome.exe no specs chrome.exe no specs notification_helper.exe no specs chrome.exe no specs setup.exe no specs setup.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs chrome.exe no specs pulsebrowser.exe no specs pulsebrowser.exe pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs pulsebrowser.exe no specs slui.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1520"C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exe" --type=renderer --extension-process --force-high-res-timeticks=disabled --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=12 --metrics-shmem-handle=5032,i,15556454324588038603,11524222044695102205,2097152 --field-trial-handle=2076,i,1438117717028448872,2390837013216007988,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:2C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exepulsebrowser.exe
User:
admin
Company:
Pulse Software
Integrity Level:
LOW
Description:
PulseBrowser
Exit code:
0
Version:
140.0.7339.197
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\pulsebrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\140.0.7339.197\pulsebrowser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2364"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
2480C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exe --crash-handler --database=C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\Crashpad --url=https://pulsebrowser.com/ --annotation=prod=PulseBrowserUpdater --annotation=ver=133.0.6943.170 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff675f3454c,0x7ff675f34558,0x7ff675f34568C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exeupdater.exe
User:
admin
Company:
The Chromium Authors
Integrity Level:
MEDIUM
Description:
Pulse Browser Updater
Exit code:
0
Version:
133.0.6943.170
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowserupdater\133.0.6943.170\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
2688"C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exe" --server --service=update-internal -EmbeddingC:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exe
svchost.exe
User:
admin
Company:
The Chromium Authors
Integrity Level:
MEDIUM
Description:
Pulse Browser Updater
Exit code:
0
Version:
133.0.6943.170
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowserupdater\133.0.6943.170\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
3436"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --field-trial-handle=5248,i,12033771735872657133,11174857687529353244,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=5068 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3500C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exe --crash-handler --database=C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\Crashpad --url=https://pulsebrowser.com/ --annotation=prod=PulseBrowserUpdater --annotation=ver=133.0.6943.170 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff675f3454c,0x7ff675f34558,0x7ff675f34568C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exeupdater.exe
User:
admin
Company:
The Chromium Authors
Integrity Level:
MEDIUM
Description:
Pulse Browser Updater
Exit code:
0
Version:
133.0.6943.170
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowserupdater\133.0.6943.170\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
3544"C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --force-high-res-timeticks=disabled --metrics-shmem-handle=5200,i,9289881430325868208,8027916081103034901,524288 --field-trial-handle=2076,i,1438117717028448872,2390837013216007988,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:8C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exepulsebrowser.exe
User:
admin
Company:
Pulse Software
Integrity Level:
LOW
Description:
PulseBrowser
Exit code:
0
Version:
140.0.7339.197
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\pulsebrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\140.0.7339.197\pulsebrowser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
5336"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --message-loop-type-ui --string-annotations --field-trial-handle=6880,i,12033771735872657133,11174857687529353244,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=7036 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5600"C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --force-high-res-timeticks=disabled --metrics-shmem-handle=5500,i,18332087696453580382,7600242432608927500,524288 --field-trial-handle=2076,i,1438117717028448872,2390837013216007988,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:8C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exepulsebrowser.exe
User:
admin
Company:
Pulse Software
Integrity Level:
LOW
Description:
PulseBrowser
Exit code:
0
Version:
140.0.7339.197
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\pulsebrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\140.0.7339.197\pulsebrowser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
5604"C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exe" --from-installerC:\Users\admin\AppData\Local\PulseSoftware\PulseBrowser\Application\pulsebrowser.exeupdater.exe
User:
admin
Company:
Pulse Software
Integrity Level:
MEDIUM
Description:
PulseBrowser
Exit code:
0
Version:
140.0.7339.197
Modules
Images
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\pulsebrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\pulsesoftware\pulsebrowser\application\140.0.7339.197\pulsebrowser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\advapi32.dll
Total events
6 755
Read events
6 517
Write events
231
Delete events
7

Modification events

(PID) Process:(5788) updater.exeKey:HKEY_CURRENT_USER\SOFTWARE\PulseSoftware\Update\Clients\{30546620-7888-4826-95be-9631ae2eea6e}
Operation:writeName:pv
Value:
133.0.6943.170
(PID) Process:(5788) updater.exeKey:HKEY_CURRENT_USER\SOFTWARE\PulseSoftware\Update\Clients\{30546620-7888-4826-95be-9631ae2eea6e}
Operation:writeName:name
Value:
PulseBrowserUpdater
(PID) Process:(5788) updater.exeKey:HKEY_CURRENT_USER\SOFTWARE\PulseSoftware\Update\ClientState\{30546620-7888-4826-95be-9631ae2eea6e}
Operation:writeName:pv
Value:
133.0.6943.170
(PID) Process:(5788) updater.exeKey:HKEY_CURRENT_USER\SOFTWARE\PulseSoftware\Update\ClientState\{30546620-7888-4826-95be-9631ae2eea6e}
Operation:writeName:name
Value:
PulseBrowserUpdater
(PID) Process:(5788) updater.exeKey:HKEY_CLASSES_ROOT\WOW6432Node\Interface\{8D809B49-F091-57EE-B1D0-62356D0097D8}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5788) updater.exeKey:HKEY_CLASSES_ROOT\Interface\{8D809B49-F091-57EE-B1D0-62356D0097D8}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5788) updater.exeKey:HKEY_CLASSES_ROOT\WOW6432Node\Interface\{125F834B-6934-502E-AD40-D6A9D5A0D62D}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5788) updater.exeKey:HKEY_CLASSES_ROOT\Interface\{125F834B-6934-502E-AD40-D6A9D5A0D62D}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5788) updater.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:PulseBrowserUpdaterTaskUser133.0.6943.170
Value:
"C:\Users\admin\AppData\Local\PulseSoftware\PulseBrowserUpdater\133.0.6943.170\updater.exe" --wake
(PID) Process:(2688) updater.exeKey:HKEY_CURRENT_USER\SOFTWARE\PulseSoftware\Update\ClientState\{30546620-7888-4826-95be-9631ae2eea6e}
Operation:writeName:pv
Value:
133.0.6943.170
Executable files
10
Suspicious files
151
Text files
217
Unknown types
1

Dropped files

PID
Process
Filename
Type
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RFfe093.TMP
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RFfe0a2.TMP
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RFfe0a2.TMP
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB\LOG.old~RFfe0a2.TMP
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\ClientCertificates\LOG.old~RFfe0a2.TMP
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDB\LOG.old
MD5:
SHA256:
7616chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
125
TCP/UDP connections
123
DNS requests
125
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7424
updater.exe
GET
54.192.35.41:443
https://files.pulsesupdate.com/versions/pulse/pulsebrowser_installer_140.0.7339.197.crx3
US
unknown
7876
chrome.exe
GET
200
142.250.186.142:80
http://clients2.google.com/time/1/current?cup2key=8:_HT5hhsk-wMiVIgqKlA-vxgm5JxWa3Psb_NkYnQGtJc&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
US
text
107 b
whitelisted
7876
chrome.exe
GET
200
65.8.131.47:443
https://get13.pulsebrowser.net/MTAwNDg3NDMwfHZPT0RjV2F1NnZMcU1KRWx8MTc2ODM4NDIyMQ
US
html
456 b
unknown
7876
chrome.exe
GET
200
65.8.131.47:443
https://get13.pulsebrowser.net/?tid=MTAwNDg3NDMwfHZPT0RjV2F1NnZMcU1KRWx8MTc2ODM4NDIyMQ
US
executable
128 Kb
unknown
7876
chrome.exe
GET
200
216.58.206.42:443
https://safebrowsingohttpgateway.googleapis.com/v1/ohttp/hpkekeyconfig?key=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE
US
binary
41 b
whitelisted
7876
chrome.exe
POST
200
142.251.5.84:443
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
US
text
17 b
whitelisted
4476
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
4476
svchost.exe
GET
200
72.246.29.11:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
7616
chrome.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEEj8k7RgVZSNNqfJionWlBY%3D
US
binary
1.42 Kb
whitelisted
7616
chrome.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSdE3gf41WAic8Uh9lF92%2BIJqh5qwQUMuuSmv81lkgvKEBCcCA2kVwXheYCEDPXCKiRQFMZ4qW70zm5rW4%3D
US
binary
765 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4476
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
6768
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4744
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
7876
chrome.exe
142.250.186.142:80
clients2.google.com
GOOGLE
US
whitelisted
7876
chrome.exe
216.58.206.42:443
safebrowsingohttpgateway.googleapis.com
GOOGLE
US
whitelisted
7876
chrome.exe
65.8.131.47:443
get13.pulsebrowser.net
AMAZON-02
US
whitelisted
7876
chrome.exe
142.251.5.84:443
accounts.google.com
GOOGLE
US
whitelisted
7876
chrome.exe
142.250.186.142:443
clients2.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 172.217.20.142
whitelisted
clients2.google.com
  • 142.250.186.142
whitelisted
safebrowsingohttpgateway.googleapis.com
  • 216.58.206.42
  • 142.250.184.202
  • 142.250.186.170
  • 142.250.185.170
  • 142.250.186.138
  • 216.58.206.74
  • 142.250.185.106
  • 142.251.141.106
  • 172.217.20.138
  • 142.250.185.202
  • 142.250.184.234
  • 142.250.185.138
  • 142.251.208.10
  • 142.251.140.170
  • 216.58.212.138
  • 172.217.18.10
whitelisted
get13.pulsebrowser.net
  • 65.8.131.47
  • 65.8.131.111
  • 65.8.131.81
  • 65.8.131.57
unknown
accounts.google.com
  • 142.251.5.84
whitelisted
sb-ssl.google.com
  • 142.250.186.142
whitelisted
www.google.com
  • 216.58.206.36
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 72.246.29.11
  • 23.59.18.102
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
7876
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7876
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
Misc activity
ET INFO Observed UA-CPU Header
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
7876
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
No debug info