File name:

New folder.rar

Full analysis: https://app.any.run/tasks/bda36c1b-7bac-4dae-ae1d-c3b20087ebb4
Verdict: Malicious activity
Analysis date: July 22, 2024, 20:58:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
netreactor
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

F271F5DC715E54BF2512E879FA3213B3

SHA1:

0E69E10DE4ED16E875D819779629D51A60758EEC

SHA256:

11D38AEB5398CC5AF77D4D87C35595090A70F4FE348325CD00B9CBC9B2C5B56B

SSDEEP:

196608:zByaJfq+6F9yVbRohs8Ew8kU23MzVAegxa:8aRzbRoqHw8ZOMzuVxa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 5196)
      • Boomx86.exe (PID: 1128)
      • Chrome.exe (PID: 1816)
  • SUSPICIOUS

    • Reads the BIOS version

      • GV.exe (PID: 6588)
      • GV.exe (PID: 6376)
    • Executable content was dropped or overwritten

      • Boomx86.exe (PID: 1128)
      • Chrome.exe (PID: 1816)
    • Reads security settings of Internet Explorer

      • Boomx86.exe (PID: 1128)
    • Executes application which crashes

      • genericVolvo.exe (PID: 1548)
    • Process drops legitimate windows executable

      • Chrome.exe (PID: 1816)
  • INFO

    • Checks proxy server information

      • slui.exe (PID: 1180)
      • WerFault.exe (PID: 4216)
    • Manual execution by a user

      • JITFreezer.exe (PID: 2656)
      • Boomx86.exe (PID: 1128)
      • genericVolvo.exe (PID: 1548)
      • WinRAR.exe (PID: 6040)
      • Chrome.exe (PID: 1816)
      • GV.exe (PID: 6376)
      • firefox.exe (PID: 1264)
      • WinRAR.exe (PID: 7672)
    • Reads the software policy settings

      • slui.exe (PID: 1180)
    • Checks supported languages

      • GV.exe (PID: 6588)
      • JITFreezer.exe (PID: 2656)
      • Boomx86.exe (PID: 1128)
      • genericVolvo.exe (PID: 1548)
      • GV.exe (PID: 6376)
      • Chrome.exe (PID: 1816)
      • TextInputHost.exe (PID: 4192)
    • Create files in a temporary directory

      • Boomx86.exe (PID: 1128)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5196)
      • firefox.exe (PID: 6412)
    • Reads the computer name

      • JITFreezer.exe (PID: 2656)
      • GV.exe (PID: 6588)
      • Boomx86.exe (PID: 1128)
      • genericVolvo.exe (PID: 1548)
      • GV.exe (PID: 6376)
      • Chrome.exe (PID: 1816)
      • TextInputHost.exe (PID: 4192)
    • Reads the machine GUID from the registry

      • Boomx86.exe (PID: 1128)
      • JITFreezer.exe (PID: 2656)
      • GV.exe (PID: 6376)
      • genericVolvo.exe (PID: 1548)
    • .NET Reactor protector has been detected

      • genericVolvo.exe (PID: 1548)
      • GV.exe (PID: 6376)
    • Application launched itself

      • firefox.exe (PID: 1264)
      • firefox.exe (PID: 6412)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4216)
    • Reads Microsoft Office registry keys

      • firefox.exe (PID: 6412)
    • Drops the executable file immediately after the start

      • firefox.exe (PID: 6412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
27
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe slui.exe no specs slui.exe rundll32.exe no specs jitfreezer.exe no specs conhost.exe no specs gv.exe no specs boomx86.exe conhost.exe no specs THREAT genericvolvo.exe werfault.exe winrar.exe no specs THREAT gv.exe no specs chrome.exe firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs textinputhost.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5824 -childID 4 -isForBrowser -prefsHandle 5868 -prefMapHandle 5864 -prefsLen 31207 -prefMapSize 244343 -jsInitHandle 1440 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db69bcdf-4f9a-4f90-b20b-f5ea80114879} 6412 "\\.\pipe\gecko-crash-server-pipe.6412" 221091e5d90 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1128"C:\Users\admin\Desktop\New folder\ExtremeDumper\Boomx86.exe" C:\Users\admin\Desktop\New folder\ExtremeDumper\Boomx86.exe
explorer.exe
User:
admin
Company:
ExtremeDumper-x86
Integrity Level:
HIGH
Description:
ExtremeDumper-x86
Exit code:
3221225786
Version:
4.0.0.1
Modules
Images
c:\users\admin\desktop\new folder\extremedumper\boomx86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1180C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1264"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
1548"C:\Users\admin\Desktop\Dumps\genericVolvo.exe" C:\Users\admin\Desktop\Dumps\genericVolvo.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
genericVolvo
Exit code:
3762504530
Version:
0.2.6.0
Modules
Images
c:\users\admin\desktop\dumps\genericvolvo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1676C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1676"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4680 -childID 2 -isForBrowser -prefsHandle 2608 -prefMapHandle 4656 -prefsLen 36263 -prefMapSize 244343 -jsInitHandle 1440 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2679479-220c-40db-8faa-fb09a3ed4f72} 6412 "\\.\pipe\gecko-crash-server-pipe.6412" 2210723ebd0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1816"C:\Users\admin\Desktop\New folder\MegaDumper\Chrome.exe" C:\Users\admin\Desktop\New folder\MegaDumper\Chrome.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
MegaDumper
Exit code:
0
Version:
1.0.5565.36604
Modules
Images
c:\users\admin\desktop\new folder\megadumper\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2656"C:\Users\admin\Desktop\New folder\AnyCpu\JITFreezer.exe" "C:\Users\admin\Desktop\New folder\GV.exe"C:\Users\admin\Desktop\New folder\AnyCpu\JITFreezer.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
JITFreezer
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\new folder\anycpu\jitfreezer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3484\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBoomx86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
42 276
Read events
42 040
Write events
226
Delete events
10

Modification events

(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\New folder.rar
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(5196) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\AppData\Local\Temp
Executable files
335
Suspicious files
189
Text files
54
Unknown types
2

Dropped files

PID
Process
Filename
Type
5196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5196.25419\New folder\ExtremeDumper\Boom.exeexecutable
MD5:5B59AEC378E0A011FE24A911090E85C0
SHA256:42774BB3D8196E410A74F896567EA65156FEB63E3228BFDF54AB5A539293DC57
5196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5196.25419\New folder\ExtremeDumper\ExtremeDumper.exeexecutable
MD5:58DB100B228FF17F83726D4C2738990E
SHA256:F407B67A008FC2186329D5FEFFE830F7EEAD7A11F3B169D0D90099495EDFCF2E
1128Boomx86.exeC:\Users\admin\AppData\Local\Temp\Costura\CFA0B0B143E4C50194769B9A2552FFEF\32\extremedumper.loaderhook.dllexecutable
MD5:666BB02763FE5CEB4FFF36DB4D5CEFAD
SHA256:8B8C972255F75488D0B562DF4DF6A281D52911E39CEEB43E05801B4658FF358D
1128Boomx86.exeC:\Users\admin\Desktop\Dumps\_.dllexecutable
MD5:27A438E3E38E4992FE8D15D4931AC437
SHA256:9C267142C645EE688FBADC4349DF045468BEB5A430A4346F9EF4371915E642D3
6412firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\urlCache-current.binbinary
MD5:297E88D7CEB26E549254EC875649F4EB
SHA256:8B75D4FB1845BAA06122888D11F6B65E6A36B140C54A72CC13DF390FD7C95702
4216WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER167C.tmp.dmpbinary
MD5:749943107D274B1AD89B5D6A6F1DF0BF
SHA256:4DA23DA9C7E232AD69C3553268684885006EC2DD5758235826668006C370BD83
5196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5196.25419\New folder\AnyCpu\Colorful.Console.dllexecutable
MD5:AC4267B870699A799E05B2BE2D2956DA
SHA256:309C616209120EE751DF11612A8EADD06E8C86E68510D0B31BA21290782516FC
5196WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5196.25419\New folder\MegaDumper\Chrome.exeexecutable
MD5:F24EB16D357C8466B0D39609290E701B
SHA256:1190F0340F7F211C0AB417FFB125AA7F8781342D1D1FFADA6A48659B6E76429B
6412firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
4216WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER17A7.tmp.xmlxml
MD5:1DDCBD6BB19606250E4531B79B9EB19C
SHA256:E086C1D51F905F99CE681B55E326FB65D3FC5E3CDC0D5A5206924E36D039AAB4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
119
DNS requests
162
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6412
firefox.exe
POST
200
184.24.77.67:80
http://r10.o.lencr.org/
unknown
unknown
6412
firefox.exe
POST
200
184.24.77.67:80
http://r3.o.lencr.org/
unknown
unknown
6412
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
6412
firefox.exe
POST
200
184.24.77.67:80
http://r10.o.lencr.org/
unknown
unknown
6412
firefox.exe
POST
200
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
6412
firefox.exe
POST
200
184.24.77.67:80
http://r10.o.lencr.org/
unknown
unknown
6412
firefox.exe
POST
200
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
6412
firefox.exe
POST
200
184.24.77.67:80
http://r10.o.lencr.org/
unknown
unknown
6412
firefox.exe
POST
200
184.24.77.48:80
http://r11.o.lencr.org/
unknown
unknown
6412
firefox.exe
POST
200
184.24.77.48:80
http://r11.o.lencr.org/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6012
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4288
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3488
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4.209.33.156:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4748
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3488
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1180
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.142
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 2.20.142.146
  • 2.20.142.179
  • 92.122.215.96
  • 2.20.142.145
  • 2.20.142.139
  • 92.122.215.95
  • 2.20.142.181
  • 2.20.142.138
  • 2.20.142.137
whitelisted
login.live.com
  • 20.190.159.23
  • 40.126.31.67
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.0
  • 20.190.159.71
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted

Threats

PID
Process
Class
Message
2284
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
2284
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
No debug info