URL:

pdf-fast.com

Full analysis: https://app.any.run/tasks/139513a4-f343-41dd-ab57-3e5ae98e1d29
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 17, 2025, 19:23:56
OS: Windows 11 Professional (build: 22000, 64 bit)
Tags:
loader
arch-doc
arch-html
arch-exec
arch-scr
ransomware
Indicators:
MD5:

72958B908668F89EA242B4F08C167DE7

SHA1:

E4FCE5DE846FFF0BA8373FC32553259FF73DD2A8

SHA256:

F9A51148B7A7FE49F8DA577E7AB16CCB6626F1E50DEE2092032C4A7765D636A9

SSDEEP:

3:YD8:YD8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • PDFast.exe (PID: 7068)
      • Microsoft.Media.Player.exe (PID: 5952)
    • Reads the Windows owner or organization settings

      • PDFast.exe (PID: 7068)
      • msiexec.exe (PID: 7144)
    • Executable content was dropped or overwritten

      • PDFast.exe (PID: 7068)
      • rundll32.exe (PID: 5608)
      • rundll32.exe (PID: 3472)
      • rundll32.exe (PID: 6388)
      • rundll32.exe (PID: 4528)
      • PDFast.exe (PID: 5484)
    • Reads settings of System Certificates

      • PDFast.exe (PID: 7068)
      • rundll32.exe (PID: 4528)
      • rundll32.exe (PID: 5608)
      • PDFast.exe (PID: 6932)
      • PDFast.exe (PID: 5484)
    • Cleans NTFS data stream (Zone Identifier)

      • chrome.exe (PID: 1160)
    • Process drops legitimate windows executable

      • PDFast.exe (PID: 7068)
      • PDFast.exe (PID: 5484)
    • The process creates files with name similar to system file names

      • rundll32.exe (PID: 3472)
    • Reads the Internet Settings

      • rundll32.exe (PID: 6388)
      • rundll32.exe (PID: 5608)
      • rundll32.exe (PID: 4528)
      • Taskmgr.exe (PID: 6264)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
      • OpenWith.exe (PID: 5064)
      • Microsoft.Media.Player.exe (PID: 5952)
    • The process drops C-runtime libraries

      • PDFast.exe (PID: 5484)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 1160)
      • chrome.exe (PID: 6408)
    • Checks supported languages

      • PDFast.exe (PID: 7068)
      • msiexec.exe (PID: 7144)
      • msiexec.exe (PID: 5212)
      • msiexec.exe (PID: 4996)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
      • PDFast.exe (PID: 3684)
      • Microsoft.Media.Player.exe (PID: 5952)
    • Reads the machine GUID from the registry

      • PDFast.exe (PID: 7068)
      • msiexec.exe (PID: 7144)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
      • PDFast.exe (PID: 3684)
    • Reads Environment values

      • PDFast.exe (PID: 7068)
      • msiexec.exe (PID: 4996)
      • msiexec.exe (PID: 5212)
      • Microsoft.Media.Player.exe (PID: 5952)
    • The sample compiled with english language support

      • chrome.exe (PID: 1160)
      • msiexec.exe (PID: 7144)
      • PDFast.exe (PID: 7068)
      • PDFast.exe (PID: 5484)
      • chrome.exe (PID: 3372)
      • chrome.exe (PID: 2356)
    • Create files in a temporary directory

      • PDFast.exe (PID: 7068)
      • rundll32.exe (PID: 3472)
      • rundll32.exe (PID: 4528)
      • rundll32.exe (PID: 5608)
      • rundll32.exe (PID: 6388)
    • Reads the software policy settings

      • msiexec.exe (PID: 4636)
      • PDFast.exe (PID: 7068)
      • msiexec.exe (PID: 7144)
      • rundll32.exe (PID: 5608)
      • rundll32.exe (PID: 4528)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 4636)
      • rundll32.exe (PID: 6388)
      • Taskmgr.exe (PID: 6264)
      • explorer.exe (PID: 2256)
      • OpenWith.exe (PID: 5064)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7144)
      • chrome.exe (PID: 1160)
      • chrome.exe (PID: 3372)
      • chrome.exe (PID: 2356)
    • Reads the computer name

      • msiexec.exe (PID: 5212)
      • msiexec.exe (PID: 7144)
      • msiexec.exe (PID: 4996)
      • PDFast.exe (PID: 7068)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
      • PDFast.exe (PID: 3684)
      • Microsoft.Media.Player.exe (PID: 5952)
    • Creates files or folders in the user directory

      • PDFast.exe (PID: 7068)
      • rundll32.exe (PID: 3472)
      • msiexec.exe (PID: 7144)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
      • Microsoft.Media.Player.exe (PID: 5952)
      • PDFast.exe (PID: 3684)
    • Disables trace logs

      • rundll32.exe (PID: 5608)
      • rundll32.exe (PID: 4528)
      • PDFast.exe (PID: 5484)
      • PDFast.exe (PID: 6932)
    • Checks proxy server information

      • rundll32.exe (PID: 5608)
      • rundll32.exe (PID: 4528)
      • PDFast.exe (PID: 6932)
      • PDFast.exe (PID: 5484)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7144)
    • Manual execution by a user

      • PDFast.exe (PID: 5484)
      • Taskmgr.exe (PID: 5812)
      • Taskmgr.exe (PID: 6264)
      • PDFast.exe (PID: 6932)
    • Reads the Internet Settings

      • explorer.exe (PID: 2256)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 5064)
    • Reads product name

      • Microsoft.Media.Player.exe (PID: 5952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
179
Monitored processes
64
Malicious processes
3
Suspicious processes
5

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pdfast.exe msiexec.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs rundll32.exe rundll32.exe rundll32.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs rundll32.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs taskmgr.exe no specs taskmgr.exe chrome.exe no specs pdfast.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs pdfast.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs explorer.exe no specs pdfast.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs openwith.exe no specs applicationframehost.exe no specs microsoft.media.player.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
296"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --field-trial-handle=2056,i,11595846987633634679,6813198272412931253,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20241002-180221.908000 --mojo-platform-channel-handle=1884 /prefetch:11C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
123.0.6312.86
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\123.0.6312.86\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
388"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --field-trial-handle=1528,i,11595846987633634679,6813198272412931253,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20241002-180221.908000 --mojo-platform-channel-handle=3752 /prefetch:14C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
123.0.6312.86
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\123.0.6312.86\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
704"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=6596,i,11595846987633634679,6813198272412931253,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20241002-180221.908000 --mojo-platform-channel-handle=6992 /prefetch:9C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
123.0.6312.86
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\123.0.6312.86\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
988C:\Windows\system32\ApplicationFrameHost.exe -EmbeddingC:\Windows\System32\ApplicationFrameHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Application Frame Host
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\applicationframehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1160"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints "pdf-fast.com"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
123.0.6312.86
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\123.0.6312.86\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\advapi32.dll
1360"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --field-trial-handle=3864,i,11595846987633634679,6813198272412931253,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20241002-180221.908000 --mojo-platform-channel-handle=6484 /prefetch:14C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
123.0.6312.86
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\123.0.6312.86\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1664C:\Windows\system32\svchost.exe -k NetworkService -pC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1740"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --field-trial-handle=6292,i,11595846987633634679,6813198272412931253,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20241002-180221.908000 --mojo-platform-channel-handle=6260 /prefetch:14C:\Program Files (x86)\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
123.0.6312.86
Modules
Images
c:\program files (x86)\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\google\chrome\application\123.0.6312.86\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1840"explorer.exe" "C:\Users\admin\AppData\Roaming\PDFast\PDFast.exe"C:\Windows\SysWOW64\explorer.exePDFast.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.22000.184 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64base.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64con.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
2256C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.22000.184 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\twinapi.dll
Total events
61 108
Read events
60 782
Write events
299
Delete events
27

Modification events

(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(1160) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(1160) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
225
Suspicious files
581
Text files
189
Unknown types
5

Dropped files

PID
Process
Filename
Type
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-68015557-488.pma
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF164a6b.TMP
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF164a6b.TMP
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF164a6b.TMP
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF164a6b.TMP
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
1160chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF164a7b.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
492
TCP/UDP connections
193
DNS requests
137
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1352
svchost.exe
GET
200
23.53.42.64:80
http://www.msftconnecttest.com/connecttest.txt
unknown
whitelisted
3828
smartscreen.exe
GET
200
208.89.74.29:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?3a86424a516aac1a
unknown
whitelisted
5336
MoUsoCoreWorker.exe
GET
200
208.89.74.29:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?189273ddd46095c2
unknown
whitelisted
HEAD
200
23.197.142.186:443
https://fs.microsoft.com/fs/windows/config.json
unknown
POST
200
108.141.37.120:443
https://checkappexec.microsoft.com/windows/shell/actions
unknown
binary
182 b
whitelisted
POST
200
20.190.159.128:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
GET
200
142.250.186.74:443
https://safebrowsingohttpgateway.googleapis.com/v1/ohttp/hpkekeyconfig?key=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
unknown
binary
41 b
whitelisted
GET
200
169.150.247.36:443
https://pdf-fast.com/
unknown
html
22.1 Kb
malicious
GET
200
23.197.142.186:443
https://fs.microsoft.com/fs/windows/config.json
unknown
binary
55 b
whitelisted
POST
200
40.126.32.138:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1352
svchost.exe
23.53.42.64:80
Akamai International B.V.
DE
unknown
3828
smartscreen.exe
51.137.3.145:443
checkappexec.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3828
smartscreen.exe
208.89.74.29:80
ctldl.windowsupdate.com
US
whitelisted
5336
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5336
MoUsoCoreWorker.exe
208.89.74.29:80
ctldl.windowsupdate.com
US
whitelisted
3640
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2996
svchost.exe
23.197.142.186:443
fs.microsoft.com
Akamai International B.V.
US
whitelisted
1160
chrome.exe
239.255.255.250:1900
whitelisted
296
chrome.exe
169.150.247.38:80
pdf-fast.com
GB
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
checkappexec.microsoft.com
  • 51.137.3.145
whitelisted
ctldl.windowsupdate.com
  • 208.89.74.29
  • 208.89.74.19
  • 208.89.74.21
  • 208.89.74.17
  • 208.89.74.23
  • 208.89.74.27
  • 199.232.210.172
  • 199.232.214.172
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
login.live.com
  • 20.190.159.73
  • 20.190.159.23
  • 40.126.31.3
  • 40.126.31.130
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.64
  • 40.126.31.131
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.14
  • 20.190.160.128
  • 20.190.160.65
  • 20.190.160.67
  • 20.190.160.2
whitelisted
fs.microsoft.com
  • 23.197.142.186
whitelisted
pdf-fast.com
  • 169.150.247.38
  • 169.150.247.39
malicious
safebrowsingohttpgateway.googleapis.com
  • 142.250.186.74
  • 142.250.184.234
  • 142.250.186.42
  • 172.217.16.202
  • 142.250.186.170
  • 142.250.186.106
  • 172.217.18.106
  • 142.250.74.202
  • 142.250.184.202
  • 216.58.206.74
  • 216.58.212.170
  • 172.217.16.138
  • 172.217.18.10
  • 142.250.185.74
  • 142.250.186.138
  • 216.58.206.42
whitelisted
accounts.google.com
  • 172.217.218.84
whitelisted
v10.events.data.microsoft.com
  • 51.116.253.169
whitelisted

Threats

PID
Process
Class
Message
1352
svchost.exe
Misc activity
ET INFO Microsoft Connection Test
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
Potentially Bad Traffic
ET HUNTING Terse Request for Zip File (GET)
Potentially Bad Traffic
ET HUNTING Terse Request for Zip File (GET)
No debug info