URL:

https://github.com/zox47/JetBrains-products-Activation-code-until-5-August-2025

Full analysis: https://app.any.run/tasks/a725a528-9bb0-44d7-9984-d730e47ecb9e
Verdict: Malicious activity
Analysis date: April 23, 2025, 21:21:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
python
Indicators:
MD5:

F054AA56A5C383FCFD466976244F7B8F

SHA1:

1689FAF25BD4921203131CBF7E83A4AE616D69F3

SHA256:

10C8AD068E2A792554DDD528F0BDE87BD5220FC8BC69D364B44A88599C8E3D2B

SSDEEP:

3:N8tEdvGSPVLQmGWZGZRLLuAIQl4f:2u4SNLsWZo/uilo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • downloader.exe (PID: 4528)
    • Changes Windows Defender settings

      • downloader.exe (PID: 4528)
    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 6828)
    • Opens a text file (SCRIPT)

      • wscript.exe (PID: 6828)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Jetbrains_Activator.exe (PID: 2644)
      • downloader.exe (PID: 2148)
    • The process executes VB scripts

      • Jetbrains_Activator.exe (PID: 2644)
      • wscript.exe (PID: 3676)
    • Process drops python dynamic module

      • downloader.exe (PID: 2148)
    • Reads security settings of Internet Explorer

      • Jetbrains_Activator.exe (PID: 2644)
    • Process drops legitimate windows executable

      • downloader.exe (PID: 2148)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 3676)
      • wscript.exe (PID: 6828)
    • Application launched itself

      • wscript.exe (PID: 3676)
      • downloader.exe (PID: 2148)
    • Checks whether a specific file exists (SCRIPT)

      • wscript.exe (PID: 6828)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 6828)
    • The process drops C-runtime libraries

      • downloader.exe (PID: 2148)
    • Starts POWERSHELL.EXE for commands execution

      • downloader.exe (PID: 4528)
    • Loads Python modules

      • downloader.exe (PID: 4528)
    • Script adds exclusion path to Windows Defender

      • downloader.exe (PID: 4528)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 3676)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 6828)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 6828)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 1812)
    • Manual execution by a user

      • notepad.exe (PID: 6436)
      • Jetbrains_Activator.exe (PID: 1116)
      • Jetbrains_Activator.exe (PID: 2644)
      • WinRAR.exe (PID: 7920)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6436)
    • Reads the software policy settings

      • slui.exe (PID: 7776)
      • slui.exe (PID: 1020)
    • Creates files or folders in the user directory

      • Jetbrains_Activator.exe (PID: 2644)
    • Checks supported languages

      • Jetbrains_Activator.exe (PID: 2644)
      • downloader.exe (PID: 2148)
      • downloader.exe (PID: 4528)
    • Reads the computer name

      • Jetbrains_Activator.exe (PID: 2644)
      • downloader.exe (PID: 2148)
      • downloader.exe (PID: 4528)
    • Process checks computer location settings

      • Jetbrains_Activator.exe (PID: 2644)
    • Create files in a temporary directory

      • downloader.exe (PID: 2148)
    • The sample compiled with english language support

      • downloader.exe (PID: 2148)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 8060)
      • powershell.exe (PID: 3900)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 8060)
      • powershell.exe (PID: 3900)
    • Matches regexp pattern (SCRIPT)

      • wscript.exe (PID: 6828)
    • Checks proxy server information

      • slui.exe (PID: 1020)
      • downloader.exe (PID: 4528)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
173
Monitored processes
37
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs rundll32.exe no specs winrar.exe notepad.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe jetbrains_activator.exe no specs jetbrains_activator.exe downloader.exe wscript.exe no specs wscript.exe no specs downloader.exe no specs chrome.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffc88e3dc40,0x7ffc88e3dc4c,0x7ffc88e3dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1020C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1116"C:\Users\admin\Downloads\JetBrains-products-Activation-code-until-5-August-2025-main\JetBrains-products-Activation-code-until-5-August-2025-main\Jetbrains_Activator.exe" C:\Users\admin\Downloads\JetBrains-products-Activation-code-until-5-August-2025-main\JetBrains-products-Activation-code-until-5-August-2025-main\Jetbrains_Activator.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\jetbrains-products-activation-code-until-5-august-2025-main\jetbrains-products-activation-code-until-5-august-2025-main\jetbrains_activator.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1676C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1812"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints "https://github.com/zox47/JetBrains-products-Activation-code-until-5-August-2025"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2084\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2104"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5692 --field-trial-handle=1892,i,177229462162290144,10191065826593275311,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2148"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5468 --field-trial-handle=1892,i,177229462162290144,10191065826593275311,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2148"C:\Users\admin\AppData\Local\OracleJava\downloader.exe" -p2YJqUkAsJ37sruDSyNM44AXFC:\Users\admin\AppData\Local\OracleJava\downloader.exe
Jetbrains_Activator.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\oraclejava\downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2644"C:\Users\admin\Downloads\JetBrains-products-Activation-code-until-5-August-2025-main\JetBrains-products-Activation-code-until-5-August-2025-main\Jetbrains_Activator.exe" C:\Users\admin\Downloads\JetBrains-products-Activation-code-until-5-August-2025-main\JetBrains-products-Activation-code-until-5-August-2025-main\Jetbrains_Activator.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\downloads\jetbrains-products-activation-code-until-5-august-2025-main\jetbrains-products-activation-code-until-5-august-2025-main\jetbrains_activator.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
23 935
Read events
23 904
Write events
25
Delete events
6

Modification events

(PID) Process:(1812) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1812) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1812) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1812) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1812) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(2148) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000EF7C1DCD95B4DB01
(PID) Process:(7920) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7920) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7920) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7920) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
Executable files
63
Suspicious files
107
Text files
79
Unknown types
0

Dropped files

PID
Process
Filename
Type
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10be9f.TMP
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10be9f.TMP
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10be9f.TMP
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10be9f.TMP
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10be9f.TMP
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
1812chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
68
DNS requests
71
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.19.198.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1328
svchost.exe
HEAD
200
142.250.185.174:80
http://dl.google.com/edgedl/release2/chrome_component/lnu3li27zsanbe2hcsfjuvm5fq_1.0.7.1744928549/laoigpblnllgcgjnjnllmfolckpjlhki_1.0.7.1744928549_all_ady56p6vtubsna6mhkx6lu2qml3a.crx3
unknown
whitelisted
7872
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7872
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1328
svchost.exe
GET
206
142.250.185.174:80
http://dl.google.com/edgedl/release2/chrome_component/lnu3li27zsanbe2hcsfjuvm5fq_1.0.7.1744928549/laoigpblnllgcgjnjnllmfolckpjlhki_1.0.7.1744928549_all_ady56p6vtubsna6mhkx6lu2qml3a.crx3
unknown
whitelisted
1328
svchost.exe
GET
206
142.250.185.174:80
http://dl.google.com/edgedl/release2/chrome_component/lnu3li27zsanbe2hcsfjuvm5fq_1.0.7.1744928549/laoigpblnllgcgjnjnllmfolckpjlhki_1.0.7.1744928549_all_ady56p6vtubsna6mhkx6lu2qml3a.crx3
unknown
whitelisted
1328
svchost.exe
GET
206
142.250.185.174:80
http://dl.google.com/edgedl/release2/chrome_component/lnu3li27zsanbe2hcsfjuvm5fq_1.0.7.1744928549/laoigpblnllgcgjnjnllmfolckpjlhki_1.0.7.1744928549_all_ady56p6vtubsna6mhkx6lu2qml3a.crx3
unknown
whitelisted
1328
svchost.exe
GET
206
142.250.185.174:80
http://dl.google.com/edgedl/release2/chrome_component/lnu3li27zsanbe2hcsfjuvm5fq_1.0.7.1744928549/laoigpblnllgcgjnjnllmfolckpjlhki_1.0.7.1744928549_all_ady56p6vtubsna6mhkx6lu2qml3a.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.19.198.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
1812
chrome.exe
239.255.255.250:1900
whitelisted
7292
chrome.exe
140.82.121.3:443
github.com
GITHUB
US
whitelisted
7292
chrome.exe
142.251.18.84:443
accounts.google.com
GOOGLE
US
whitelisted
7292
chrome.exe
185.199.110.154:443
github.githubassets.com
FASTLY
US
whitelisted
7292
chrome.exe
185.199.109.133:443
avatars.githubusercontent.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.19.198.194
  • 23.32.238.34
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
github.com
  • 140.82.121.3
whitelisted
accounts.google.com
  • 142.251.18.84
whitelisted
github.githubassets.com
  • 185.199.110.154
  • 185.199.111.154
  • 185.199.108.154
  • 185.199.109.154
whitelisted
avatars.githubusercontent.com
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.108.133
  • 185.199.110.133
whitelisted
github-cloud.s3.amazonaws.com
  • 54.231.228.25
  • 52.216.27.140
  • 16.15.177.187
  • 16.182.69.217
  • 52.216.58.217
  • 3.5.7.164
  • 16.182.67.233
  • 3.5.29.240
whitelisted
user-images.githubusercontent.com
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.109.133
whitelisted

Threats

No threats detected
No debug info