File name:

Optimizer-16.7.exe

Full analysis: https://app.any.run/tasks/0e3c645a-9103-4534-a23d-670a03843df8
Verdict: Malicious activity
Analysis date: November 02, 2024, 11:51:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

7F57207F221DB2B08E27D64BC9121B28

SHA1:

3BFC4B12A533EE1CE62E5D348027D4AC90AB49DB

SHA256:

03A234060541B686AC4265754AFF43DF9325C21383F90E17F831E67965D717F8

SSDEEP:

49152:SVAvLOg3LmfS1MW/EC8mNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMX:Q2NMMMMMMMMMMMMMMMMMMMMMMMMMMMMx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • cmd.exe (PID: 6868)
      • net.exe (PID: 1768)
  • SUSPICIOUS

    • Modifies existing scheduled task

      • schtasks.exe (PID: 8152)
      • schtasks.exe (PID: 8104)
      • schtasks.exe (PID: 7212)
      • schtasks.exe (PID: 6356)
      • schtasks.exe (PID: 4816)
      • schtasks.exe (PID: 7228)
      • schtasks.exe (PID: 7516)
      • schtasks.exe (PID: 7644)
      • schtasks.exe (PID: 8056)
    • Executing commands from a ".bat" file

      • Optimizer-16.7.exe (PID: 5940)
    • Reads security settings of Internet Explorer

      • Optimizer-16.7.exe (PID: 5944)
    • Reads the date of Windows installation

      • Optimizer-16.7.exe (PID: 5944)
    • Application launched itself

      • Optimizer-16.7.exe (PID: 5944)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7976)
      • Optimizer-16.7.exe (PID: 5940)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 7732)
      • cmd.exe (PID: 7804)
      • cmd.exe (PID: 7768)
    • Starts CMD.EXE for commands execution

      • Optimizer-16.7.exe (PID: 5940)
  • INFO

    • The process uses the downloaded file

      • Optimizer-16.7.exe (PID: 5944)
    • Reads the computer name

      • Optimizer-16.7.exe (PID: 5944)
      • Optimizer-16.7.exe (PID: 5940)
    • Reads the machine GUID from the registry

      • Optimizer-16.7.exe (PID: 5944)
      • Optimizer-16.7.exe (PID: 5940)
    • Checks supported languages

      • Optimizer-16.7.exe (PID: 5944)
      • Optimizer-16.7.exe (PID: 5940)
    • Process checks computer location settings

      • Optimizer-16.7.exe (PID: 5944)
    • Reads Environment values

      • Optimizer-16.7.exe (PID: 5940)
    • Reads product name

      • Optimizer-16.7.exe (PID: 5940)
    • Creates files in the program directory

      • Optimizer-16.7.exe (PID: 5940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:08:18 13:30:29+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 2538496
InitializedDataSize: 34816
UninitializedDataSize: -
EntryPoint: 0x26dae2
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: The Finest Windows Optimizer
CompanyName: deadmoon © ∞
FileDescription: Optimizer
FileVersion: 0.0.0.0
InternalName: Optimizer.exe
LegalCopyright: deadmoon © ∞
LegalTrademarks: -
OriginalFileName: Optimizer.exe
ProductName: Optimizer
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
188
Monitored processes
59
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start optimizer-16.7.exe no specs optimizer-16.7.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs regedit.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
864reg add "HKCU\SOFTWARE\Microsoft\Office\15.0\Common\Feedback" /v "Enabled" /t REG_DWORD /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1112reg add "HKCU\SOFTWARE\Microsoft\Office\Common\ClientTelemetry" /v "VerboseLogging" /t REG_DWORD /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1568reg add "HKCU\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry" /v "DisableTelemetry" /t REG_DWORD /d 1 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1588"C:\Windows\System32\cmd.exe" /C schtasks.exe /change /tn NvTmRep_{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8} /disableC:\Windows\System32\cmd.exeOptimizer-16.7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1768net.exe stop NvTelemetryContainerC:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1952reg add "HKCU\SOFTWARE\Microsoft\Office\16.0\Common\Feedback" /v "Enabled" /t REG_DWORD /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2132sc.exe stop NvTelemetryContainerC:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2236reg add "HKCU\SOFTWARE\Policies\Microsoft\Office\15.0\OSM" /v "EnableLogging" /t REG_DWORD /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3832\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3952reg add "HKCU\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry" /v "VerboseLogging" /t REG_DWORD /d 0 /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
10 140
Read events
10 051
Write events
89
Delete events
0

Modification events

(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5940) Optimizer-16.7.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Optimizer-16_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
1
Text files
23
Unknown types
0

Dropped files

PID
Process
Filename
Type
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\ReadyMadeMenus\DesktopShortcuts.regtext
MD5:1213A1260BE0789ADE56ED9BA6656FCA
SHA256:52B190CD52671BA5652AFE574245D72DD91AD0EC4168EA405EECC90BF6365BEA
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\ReadyMadeMenus\SystemShortcuts.regtext
MD5:3B894F19CDEF342C0704E7774BB20AFA
SHA256:02C4C6610F2BAA98CEF5005A2155A76DD5D52B9B2C8BB49CB31E1A1EF5B74B9A
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\ReadyMadeMenus\RemoveTakeOwnership.regtext
MD5:01AE3E08513E213ECF621F92B9F0B47C
SHA256:177FB8F30D10E50115500D1B2AF488A9D885FBA42C2FB22E6FBBEE337806AF19
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\Required\DisableXboxTasks.battext
MD5:39618D49DE20114A6E4412507C4AD156
SHA256:AFF075485C4139EC19FA8C3EA1F9AFDCD4C3B6894BB93A56474273E027A7162F
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\ReadyMadeMenus\PowerMenu.regtext
MD5:2640EC954A779D0C212822991FF7CF57
SHA256:1C842C9395AAF625908F6579D201AF2754A92F08859D49D1BC7B55BBA2EAACE5
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\Required\DisableOfficeTelemetryTasks.battext
MD5:FED75B5CB9D9F4EC5EE22B8FD304CCF7
SHA256:D884C0D04BA09B113D9439D2F8C0B7ED322111AE2E3ED802F6A95278FF8E0AC2
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\Required\EnableXboxTasks.battext
MD5:FABECE235B2BEE26CAFD321A676F85F5
SHA256:DDD6EDECA0D2ABFF7DD9FAB08CB8C736D60B37648E7DFC2E8158798D7DDDF7F7
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\ReadyMadeMenus\InstallTakeOwnership.regtext
MD5:29896F795D3E250540AE33EB84D0AF71
SHA256:61FD9430AAC2D0813451326B5CAEB7F463442CEEC46A9D1D52ED34541768C931
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\Required\DisableOfficeTelemetryTasks.regtext
MD5:7F7B192506491E4105E2AE1CF5EA9067
SHA256:41CF9DB9E395349B94EC7A1EE99DB68062F27BF95C3B364AA6B035DC39FF1DC0
5940Optimizer-16.7.exeC:\ProgramData\Optimizer\Required\EnableOfficeTelemetryTasks.regtext
MD5:496768EA845782927C2A9E0DD172D241
SHA256:6A8F76C97FD957AFEC1F416363DF1E56843C8A56E0F2C470AAE66D9BE8CD2A1A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
38
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3948
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3788
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7692
SIHClient.exe
GET
200
95.101.197.132:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7692
SIHClient.exe
GET
200
95.101.197.132:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4360
SearchApp.exe
23.212.110.176:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
1252
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
5488
MoUsoCoreWorker.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4360
SearchApp.exe
23.212.110.184:443
www.bing.com
Akamai International B.V.
CZ
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
www.bing.com
  • 23.212.110.176
  • 23.212.110.184
  • 23.212.110.163
  • 23.212.110.168
  • 23.212.110.179
  • 23.212.110.177
  • 23.212.110.171
  • 23.212.110.178
  • 23.212.110.162
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
www.microsoft.com
  • 23.32.185.131
  • 95.101.197.132
whitelisted
google.com
  • 142.250.186.78
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.2
  • 20.190.159.4
  • 20.190.159.71
  • 20.190.159.68
  • 40.126.31.69
  • 20.190.159.23
  • 40.126.31.71
whitelisted
th.bing.com
  • 23.212.110.209
  • 23.212.110.146
  • 23.212.110.185
  • 23.212.110.184
  • 23.212.110.217
  • 23.212.110.187
  • 23.212.110.208
  • 23.212.110.147
  • 23.212.110.137
whitelisted
go.microsoft.com
  • 2.19.86.20
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info