File name:

Co-Skip-Setup.exe

Full analysis: https://app.any.run/tasks/4956a1b9-a5cb-4433-b425-d88913601c29
Verdict: Malicious activity
Analysis date: July 22, 2025, 08:05:17
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
inno
installer
delphi
psexec
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

08ACC52CB06D4C65AF25F4974CA6BB3C

SHA1:

66DAB737C4AA21C6418E3C797DD6C12606646554

SHA256:

05E583986A89C6EA8CDC6AEF6D07DC12DF628916F266CC7E9DDA4582234C4C12

SSDEEP:

196608:Z+P2Hirbekz9QdTPNy6YYgwC/4PP7Er8Fav:Z+uHi39RGPNpYYlC/4rlUv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • Co-Skip-Setup.tmp (PID: 2580)
    • Changes Windows Defender settings

      • Co-Skip-Setup.tmp (PID: 2580)
    • Adds path to the Windows Defender exclusion list

      • Co-Skip-Setup.tmp (PID: 2580)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 4844)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Co-Skip-Setup.tmp (PID: 2492)
      • Co-Skip-Setup.tmp (PID: 2580)
      • Co-Skip-Updater.exe (PID: 888)
    • Executable content was dropped or overwritten

      • Co-Skip-Setup.exe (PID: 2292)
      • Co-Skip-Setup.exe (PID: 7064)
      • Co-Skip-Setup.tmp (PID: 2580)
      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • Reads the Windows owner or organization settings

      • Co-Skip-Setup.tmp (PID: 2580)
    • Script adds exclusion path to Windows Defender

      • Co-Skip-Setup.tmp (PID: 2580)
    • Starts POWERSHELL.EXE for commands execution

      • Co-Skip-Setup.tmp (PID: 2580)
    • The process drops C-runtime libraries

      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • PSEXEC has been detected

      • Co-Skip-Setup.tmp (PID: 2580)
    • The process bypasses the loading of PowerShell profile settings

      • Co-Skip-Setup.tmp (PID: 2580)
    • Reads the BIOS version

      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 888)
      • Co-Skip-Updater.exe (PID: 892)
      • Co-Skip-Updater.exe (PID: 5236)
    • Process drops legitimate windows executable

      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • Process drops python dynamic module

      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • Application launched itself

      • Co-Skip-Updater.exe (PID: 888)
      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • Loads Python modules

      • Co-Skip-Updater.exe (PID: 888)
      • Co-Skip-Updater.exe (PID: 5236)
    • Reads the date of Windows installation

      • Co-Skip-Updater.exe (PID: 888)
  • INFO

    • Create files in a temporary directory

      • Co-Skip-Setup.exe (PID: 2292)
      • Co-Skip-Setup.exe (PID: 7064)
      • Co-Skip-Setup.tmp (PID: 2580)
      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • Checks supported languages

      • Co-Skip-Setup.exe (PID: 2292)
      • Co-Skip-Setup.tmp (PID: 2492)
      • Co-Skip-Setup.exe (PID: 7064)
      • Co-Skip-Setup.tmp (PID: 2580)
      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 888)
      • Co-Skip-Updater.exe (PID: 892)
      • Co-Skip-Updater.exe (PID: 5236)
    • Reads the computer name

      • Co-Skip-Setup.tmp (PID: 2492)
      • Co-Skip-Setup.exe (PID: 7064)
      • Co-Skip-Setup.tmp (PID: 2580)
      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 888)
      • Co-Skip-Updater.exe (PID: 892)
      • Co-Skip-Updater.exe (PID: 5236)
    • Process checks computer location settings

      • Co-Skip-Setup.tmp (PID: 2492)
      • Co-Skip-Setup.tmp (PID: 2580)
      • Co-Skip-Updater.exe (PID: 888)
    • Creates files in the program directory

      • Co-Skip-Setup.tmp (PID: 2580)
    • Compiled with Borland Delphi (YARA)

      • Co-Skip-Setup.exe (PID: 2292)
      • Co-Skip-Setup.tmp (PID: 2492)
    • Creates a software uninstall entry

      • Co-Skip-Setup.tmp (PID: 2580)
    • Detects InnoSetup installer (YARA)

      • Co-Skip-Setup.exe (PID: 2292)
      • Co-Skip-Setup.tmp (PID: 2492)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 4844)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4844)
    • Manual execution by a user

      • Co-Skip-Updater.exe (PID: 1944)
    • The sample compiled with english language support

      • Co-Skip-Updater.exe (PID: 1944)
      • Co-Skip-Updater.exe (PID: 892)
    • Process checks whether UAC notifications are on

      • Co-Skip-Updater.exe (PID: 892)
      • Co-Skip-Updater.exe (PID: 5236)
    • Checks proxy server information

      • Co-Skip-Updater.exe (PID: 5236)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:13 06:55:45+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 704512
InitializedDataSize: 240128
UninitializedDataSize: -
EntryPoint: 0xacfe0
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Co-Skip
FileDescription: Co-Skip Setup
FileVersion:
LegalCopyright:
OriginalFileName:
ProductName: Co-Skip
ProductVersion: 1.0.4
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
13
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start co-skip-setup.exe co-skip-setup.tmp no specs co-skip-setup.exe THREAT co-skip-setup.tmp powershell.exe no specs conhost.exe no specs co-skip-updater.exe conhost.exe no specs co-skip-updater.exe no specs co-skip-updater.exe conhost.exe no specs co-skip-updater.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
888"C:\ProgramData\Co-Skip\Co-Skip-Updater.exe" C:\ProgramData\Co-Skip\Co-Skip-Updater.exeCo-Skip-Updater.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\co-skip\co-skip-updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
892"C:\ProgramData\Co-Skip\Co-Skip-Updater.exe" C:\ProgramData\Co-Skip\Co-Skip-Updater.exe
Co-Skip-Updater.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\programdata\co-skip\co-skip-updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1944"C:\ProgramData\Co-Skip\Co-Skip-Updater.exe" C:\ProgramData\Co-Skip\Co-Skip-Updater.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\co-skip\co-skip-updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2292"C:\Users\admin\AppData\Local\Temp\Co-Skip-Setup.exe" C:\Users\admin\AppData\Local\Temp\Co-Skip-Setup.exe
explorer.exe
User:
admin
Company:
Co-Skip
Integrity Level:
MEDIUM
Description:
Co-Skip Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\co-skip-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
2492"C:\Users\admin\AppData\Local\Temp\is-B8LD0.tmp\Co-Skip-Setup.tmp" /SL5="$9035A,14199915,945664,C:\Users\admin\AppData\Local\Temp\Co-Skip-Setup.exe" C:\Users\admin\AppData\Local\Temp\is-B8LD0.tmp\Co-Skip-Setup.tmpCo-Skip-Setup.exe
User:
admin
Company:
Co-Skip
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-b8ld0.tmp\co-skip-setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
2580"C:\Users\admin\AppData\Local\Temp\is-G6RVE.tmp\Co-Skip-Setup.tmp" /SL5="$802DC,14199915,945664,C:\Users\admin\AppData\Local\Temp\Co-Skip-Setup.exe" /SPAWNWND=$90374 /NOTIFYWND=$9035A C:\Users\admin\AppData\Local\Temp\is-G6RVE.tmp\Co-Skip-Setup.tmp
Co-Skip-Setup.exe
User:
admin
Company:
Co-Skip
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-g6rve.tmp\co-skip-setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
3888\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCo-Skip-Updater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4216\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCo-Skip-Updater.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4844"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Co-Skip'"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCo-Skip-Setup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5236"C:\ProgramData\Co-Skip\Co-Skip-Updater.exe" C:\ProgramData\Co-Skip\Co-Skip-Updater.exe
Co-Skip-Updater.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\programdata\co-skip\co-skip-updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
7 089
Read events
7 062
Write events
27
Delete events
0

Modification events

(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:InstallDate
Value:
20250722
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:MajorVersion
Value:
1
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:MinorVersion
Value:
0
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:VersionMajor
Value:
1
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:VersionMinor
Value:
0
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:EstimatedSize
Value:
16764
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsExec
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Sysinternals\PsExec64
Operation:writeName:EulaAccepted
Value:
1
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.4.2
(PID) Process:(2580) Co-Skip-Setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Co-Skip_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\ProgramData\Co-Skip
Executable files
135
Suspicious files
3
Text files
8
Unknown types
4

Dropped files

PID
Process
Filename
Type
2292Co-Skip-Setup.exeC:\Users\admin\AppData\Local\Temp\is-B8LD0.tmp\Co-Skip-Setup.tmpexecutable
MD5:E4AC724C01A0B574100DB256804D11BF
SHA256:409505018D12D0E442DF147414F7D6ABBB25E6FBFB9EC9AC9B5664491A0F7D4B
2580Co-Skip-Setup.tmpC:\ProgramData\Co-Skip\is-2473M.tmpexecutable
MD5:78098ED0CE8F944EBFCEA50BEC0B0A19
SHA256:857A22F8D50288B847D730D15CD3E76AF93A12BA2B849F71699E211ACFD4A244
2580Co-Skip-Setup.tmpC:\ProgramData\Co-Skip\unins000.exeexecutable
MD5:10BFBD594D47575231BCC938E53C28AC
SHA256:5A517562ABEE486E890B0C425E607F8244BFC61F972AD62F79C724C7F51EA1A6
2580Co-Skip-Setup.tmpC:\ProgramData\Co-Skip\is-CA09D.tmpimage
MD5:7E074328A012704BA88ED8FC381A23BC
SHA256:82AA79749ED3633159A24A46316625F5F3A9B7D05FFB9ADB4127DCBE552C296A
2580Co-Skip-Setup.tmpC:\ProgramData\Co-Skip\is-PECTJ.tmpexecutable
MD5:10BFBD594D47575231BCC938E53C28AC
SHA256:5A517562ABEE486E890B0C425E607F8244BFC61F972AD62F79C724C7F51EA1A6
2580Co-Skip-Setup.tmpC:\Users\admin\AppData\Local\Temp\is-OBDC1.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4844powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hc233jaz.i3d.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4844powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:83DFC8BDE93BD5CFB0D6EFAB8DEF42CC
SHA256:578B2F0A65551E1EFD7C2E61099421C18F843DBCC9EC2C54910D1CFD21C17B00
2580Co-Skip-Setup.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Co-Skip\Co-Skip.lnklnk
MD5:2460A5C1E57B4735B1E56A8C96ECAB13
SHA256:24D02A21BD296E88F16E99DCB921466D63D8D14E7D54542D7B9F51ECF4918033
2580Co-Skip-Setup.tmpC:\ProgramData\Co-Skip\Co-Skip-Updater.exeexecutable
MD5:78098ED0CE8F944EBFCEA50BEC0B0A19
SHA256:857A22F8D50288B847D730D15CD3E76AF93A12BA2B849F71699E211ACFD4A244
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
18
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5644
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5368
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5368
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1964
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.55.110.211:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5644
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.55.110.211
  • 23.55.110.193
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.132
  • 40.126.32.138
  • 40.126.32.76
  • 20.190.160.4
  • 20.190.160.64
  • 20.190.160.65
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
co-skip-server.onrender.com
  • 216.24.57.7
  • 216.24.57.252
unknown
slscr.update.microsoft.com
  • 74.178.76.128
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Host dynamic web apps service (.onrender .com)
Misc activity
ET INFO DNS Query to Online Application Hosting Domain (onrender .com)
Misc activity
ET INFO Observed Online Application Hosting Domain (onrender .com in TLS SNI)
No debug info