URL:

https://pesktop.com/en/windows/diffchecker

Full analysis: https://app.any.run/tasks/bb2b8109-dae9-4c41-a3d1-404725822ef2
Verdict: Malicious activity
Analysis date: November 24, 2024, 16:48:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MD5:

5DCD4956F570866C1FC8AB61F74267AB

SHA1:

FD45CA456E383FD56DC17A679485FC987EB079F5

SHA256:

F7F021EF15DA9460470ACD7DB0616B713CC8887BDCA702703EA27B4B7EFE2682

SSDEEP:

3:N8EiVLKKFSML8UMu5:2E2LKKF/L8Vu5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process executes via Task Scheduler

      • default-browser-agent.exe (PID: 6276)
    • Loads DLL from Mozilla Firefox

      • default-browser-agent.exe (PID: 6276)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7164)
      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
      • ShellExperienceHost.exe (PID: 4684)
    • The process creates files with name similar to system file names

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
    • Executable content was dropped or overwritten

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
    • Drops 7-zip archiver for unpacking

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
    • Process drops legitimate windows executable

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
    • Application launched itself

      • Diffchecker.exe (PID: 7088)
      • Diffchecker.exe (PID: 4876)
    • Creates a software uninstall entry

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
    • Starts CMD.EXE for commands execution

      • Diffchecker.exe (PID: 2420)
  • INFO

    • The process uses the downloaded file

      • chrome.exe (PID: 7072)
      • chrome.exe (PID: 3224)
      • WinRAR.exe (PID: 7164)
    • Application launched itself

      • chrome.exe (PID: 3224)
      • firefox.exe (PID: 6220)
    • Checks supported languages

      • default-browser-agent.exe (PID: 6276)
      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
      • Diffchecker.exe (PID: 7088)
      • Diffchecker.exe (PID: 1216)
      • Diffchecker.exe (PID: 1876)
      • Diffchecker.exe (PID: 6092)
      • Diffchecker.exe (PID: 6016)
      • ShellExperienceHost.exe (PID: 4684)
      • Diffchecker.exe (PID: 4876)
      • Diffchecker.exe (PID: 2976)
      • Diffchecker.exe (PID: 6440)
      • Diffchecker.exe (PID: 1220)
      • Diffchecker.exe (PID: 2420)
      • Diffchecker.exe (PID: 6920)
      • Diffchecker.exe (PID: 6936)
      • Diffchecker.exe (PID: 6812)
      • Diffchecker.exe (PID: 6212)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 3224)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7164)
    • Manual execution by a user

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
      • Diffchecker.exe (PID: 7088)
      • notepad.exe (PID: 6276)
      • Diffchecker.exe (PID: 4876)
    • Reads the computer name

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
      • Diffchecker.exe (PID: 7088)
      • Diffchecker.exe (PID: 1876)
      • Diffchecker.exe (PID: 6092)
      • ShellExperienceHost.exe (PID: 4684)
      • Diffchecker.exe (PID: 4876)
      • Diffchecker.exe (PID: 1220)
      • Diffchecker.exe (PID: 6440)
    • Create files in a temporary directory

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
      • Diffchecker.exe (PID: 1216)
      • Diffchecker.exe (PID: 2976)
    • Creates files or folders in the user directory

      • Diffchecker Web Setup 3.6.0.exe (PID: 1920)
      • Diffchecker.exe (PID: 7088)
      • Diffchecker.exe (PID: 6092)
      • Diffchecker.exe (PID: 6016)
      • Diffchecker.exe (PID: 2420)
      • Diffchecker.exe (PID: 1220)
      • Diffchecker.exe (PID: 6212)
      • Diffchecker.exe (PID: 4876)
    • Checks proxy server information

      • Diffchecker.exe (PID: 7088)
      • Diffchecker.exe (PID: 4876)
    • Process checks computer location settings

      • Diffchecker.exe (PID: 6016)
      • Diffchecker.exe (PID: 2420)
      • Diffchecker.exe (PID: 6920)
      • Diffchecker.exe (PID: 6936)
      • Diffchecker.exe (PID: 4876)
      • Diffchecker.exe (PID: 6812)
      • Diffchecker.exe (PID: 6212)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6276)
    • Sends debugging messages

      • ShellExperienceHost.exe (PID: 4684)
    • Reads the software policy settings

      • Diffchecker.exe (PID: 6092)
      • Diffchecker.exe (PID: 1220)
    • Reads the machine GUID from the registry

      • Diffchecker.exe (PID: 6092)
      • Diffchecker.exe (PID: 1220)
    • Displays MAC addresses of computer network adapters

      • getmac.exe (PID: 2144)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
178
Monitored processes
44
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs default-browser-agent.exe no specs firefox.exe no specs firefox.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe chrome.exe no specs rundll32.exe no specs diffchecker web setup 3.6.0.exe diffchecker.exe no specs diffchecker.exe no specs diffchecker.exe no specs diffchecker.exe diffchecker.exe no specs comppkgsrv.exe no specs notepad.exe no specs shellexperiencehost.exe no specs rundll32.exe no specs chrome.exe no specs chrome.exe no specs diffchecker.exe no specs diffchecker.exe no specs diffchecker.exe no specs diffchecker.exe diffchecker.exe no specs comppkgsrv.exe no specs diffchecker.exe no specs diffchecker.exe no specs cmd.exe no specs conhost.exe no specs getmac.exe no specs diffchecker.exe no specs diffchecker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5620 --field-trial-handle=1944,i,10238821382759794792,4109455516276920829,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff81829dc40,0x7ff81829dc4c,0x7ff81829dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1140\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1216C:\Users\admin\AppData\Local\Programs\Diffchecker\Diffchecker.exe --no-rate-limit --no-upload-gzip --type=crash-handler "--crashes-directory=C:\Users\admin\AppData\Local\Temp\Diffchecker Crashes" "--database=C:\Users\admin\AppData\Local\Temp\Diffchecker Crashes" "--metrics-dir=C:\Users\admin\AppData\Local\Temp\Diffchecker Crashes" --url=unused-attribute-required-by-crash-reporter --initial-client-data=0x4ac,0x4b0,0x4b4,0x4a8,0x4b8,0x7ff779c55298,0x7ff779c552a8,0x7ff779c552b8C:\Users\admin\AppData\Local\Programs\Diffchecker\Diffchecker.exeDiffchecker.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
MEDIUM
Description:
Diffchecker
Exit code:
0
Version:
3.6.0.555
Modules
Images
c:\users\admin\appdata\local\programs\diffchecker\diffchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\users\admin\appdata\local\programs\diffchecker\ffmpeg.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1220"C:\Users\admin\AppData\Local\Programs\Diffchecker\Diffchecker.exe" --type=utility --field-trial-handle=1676,16915428348596875457,3057920783643643897,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2128 /prefetch:8C:\Users\admin\AppData\Local\Programs\Diffchecker\Diffchecker.exe
Diffchecker.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
MEDIUM
Description:
Diffchecker
Version:
3.6.0.555
Modules
Images
c:\users\admin\appdata\local\programs\diffchecker\diffchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1760"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoABAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3520 --field-trial-handle=1944,i,10238821382759794792,4109455516276920829,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1852"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2192 --field-trial-handle=1944,i,10238821382759794792,4109455516276920829,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1876"C:\Users\admin\AppData\Local\Programs\Diffchecker\Diffchecker.exe" --type=gpu-process --field-trial-handle=1724,8501895326227618715,17201604828322504299,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --gpu-preferences=KAAAAAAAAADgAAAwAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --mojo-platform-channel-handle=1748 --ignored=" --type=renderer " /prefetch:2C:\Users\admin\AppData\Local\Programs\Diffchecker\Diffchecker.exeDiffchecker.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
LOW
Description:
Diffchecker
Exit code:
0
Version:
3.6.0.555
Modules
Images
c:\users\admin\appdata\local\programs\diffchecker\diffchecker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1920"C:\Users\admin\Downloads\Diffchecker 3.6.0[PeskTop.com]\Diffchecker Web Setup 3.6.0.exe" C:\Users\admin\Downloads\Diffchecker 3.6.0[PeskTop.com]\Diffchecker Web Setup 3.6.0.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Desktop version of DiffChecker
Exit code:
0
Version:
3.6.0.555
Modules
Images
c:\users\admin\downloads\diffchecker 3.6.0[pesktop.com]\diffchecker web setup 3.6.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2144C:\WINDOWS/System32/getmac.exeC:\Windows\System32\getmac.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Displays NIC MAC information
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\getmac.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
22 051
Read events
21 971
Write events
60
Delete events
20

Modification events

(PID) Process:(3224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3224) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6900) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(7072) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000AA6E35F9903EDB01
(PID) Process:(3224) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rar\OpenWithProgids
Operation:writeName:WinRAR
Value:
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
Executable files
17
Suspicious files
226
Text files
35
Unknown types
15

Dropped files

PID
Process
Filename
Type
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF1362e4.TMP
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF1362e4.TMP
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF1362e4.TMP
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF1362e4.TMP
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF1362e4.TMP
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
3224chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF1362e4.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
84
DNS requests
73
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4328
svchost.exe
GET
200
2.21.20.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4328
svchost.exe
GET
200
23.218.209.163:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2008
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2008
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4684
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1760
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adswt652opw5o5x3k7j745effonq_2024.11.23.1/jflhchccmppkfebkiaminageehmchikm_2024.11.23.01_all_acspuozde4iv3hk2dvafgaagkrwq.crx3
unknown
whitelisted
1760
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adswt652opw5o5x3k7j745effonq_2024.11.23.1/jflhchccmppkfebkiaminageehmchikm_2024.11.23.01_all_acspuozde4iv3hk2dvafgaagkrwq.crx3
unknown
whitelisted
1760
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adswt652opw5o5x3k7j745effonq_2024.11.23.1/jflhchccmppkfebkiaminageehmchikm_2024.11.23.01_all_acspuozde4iv3hk2dvafgaagkrwq.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4328
svchost.exe
2.21.20.138:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4328
svchost.exe
23.218.209.163:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.179:443
www.bing.com
Akamai International B.V.
DE
whitelisted
3224
chrome.exe
239.255.255.250:1900
whitelisted
1076
svchost.exe
23.218.210.69:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
4516
chrome.exe
172.67.69.186:443
pesktop.com
CLOUDFLARENET
US
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.21.20.138
  • 2.21.20.153
  • 2.21.20.147
whitelisted
www.microsoft.com
  • 23.218.209.163
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.bing.com
  • 104.126.37.179
  • 104.126.37.186
  • 104.126.37.129
  • 104.126.37.178
  • 104.126.37.176
  • 104.126.37.139
  • 104.126.37.130
  • 104.126.37.184
  • 104.126.37.171
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
pesktop.com
  • 172.67.69.186
  • 104.26.14.64
  • 104.26.15.64
unknown
accounts.google.com
  • 142.251.31.84
whitelisted
analytics.pesktop.com
  • 104.26.14.64
  • 172.67.69.186
  • 104.26.15.64
unknown
yvjskep4.click
  • 188.114.96.3
  • 188.114.97.3
unknown

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
No debug info