File name:

Bootstrapper.exe

Full analysis: https://app.any.run/tasks/069a938d-4461-4d3e-a691-65e87bf3aeed
Verdict: Malicious activity
Analysis date: March 07, 2025, 18:38:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
sliverfox
github
crypto-regex
golang
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 15 sections
MD5:

F2A6133B7F38FC49F792AE799D1B4750

SHA1:

6BEF46DDDE325F45A0E9FF123112C96BBD47C795

SHA256:

37BDE6655E1272E159B9C2E3A7EEE3F4E9A837C0F04240645D3991D112287F8D

SSDEEP:

98304:bRFl0PK8mmQNzHX2QYoSoOM/jaOh54B8aaLgq1riLkZIlftafd1QQuc4jbqTiZSL:wu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SLIVERFOX has been found (auto)

      • Bootstrapper.exe (PID: 300)
  • SUSPICIOUS

    • Application launched itself

      • Luna.exe (PID: 7356)
    • Executable content was dropped or overwritten

      • Bootstrapper.exe (PID: 300)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • Luna.exe (PID: 7420)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Process drops legitimate windows executable

      • Luna.exe (PID: 7420)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Found regular expressions for crypto-addresses (YARA)

      • Luna.exe (PID: 7356)
  • INFO

    • Reads the software policy settings

      • Bootstrapper.exe (PID: 300)
    • Reads the computer name

      • Bootstrapper.exe (PID: 300)
    • Checks supported languages

      • Bootstrapper.exe (PID: 300)
    • Create files in a temporary directory

      • Bootstrapper.exe (PID: 300)
      • Luna.exe (PID: 7356)
      • Luna.exe (PID: 7420)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Reads the machine GUID from the registry

      • Bootstrapper.exe (PID: 300)
    • The sample compiled with english language support

      • Luna.exe (PID: 7420)
      • MicrosoftEdgeWebview2Setup.exe (PID: 7504)
      • MicrosoftEdgeUpdate.exe (PID: 7528)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 7528)
      • MicrosoftEdgeUpdate.exe (PID: 7780)
    • Application based on Golang

      • Luna.exe (PID: 7356)
    • Detects GO elliptic curve encryption (YARA)

      • Luna.exe (PID: 7356)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 3
CodeSize: 2955264
InitializedDataSize: 321536
UninitializedDataSize: -
EntryPoint: 0x74760
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
15
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bootstrapper.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs luna.exe luna.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdatecomregistershell64.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\AppData\Local\Temp\Bootstrapper.exe" C:\Users\admin\AppData\Local\Temp\Bootstrapper.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bootstrapper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpdc.dll
1676"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2100C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBootstrapper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7356luna\Luna.exeC:\Users\admin\AppData\Local\Temp\luna\Luna.exe
Bootstrapper.exe
User:
admin
Company:
Luna
Integrity Level:
MEDIUM
Description:
Luna
Modules
Images
c:\users\admin\appdata\local\temp\luna\luna.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpdc.dll
7420C:\Users\admin\AppData\Local\Temp\luna\Luna.exeC:\Users\admin\AppData\Local\Temp\luna\Luna.exe
Luna.exe
User:
admin
Company:
Luna
Integrity Level:
MEDIUM
Description:
Luna
Modules
Images
c:\users\admin\appdata\local\temp\luna\luna.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpdc.dll
7504C:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
Luna.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update Setup
Version:
1.3.195.43
Modules
Images
c:\users\admin\appdata\local\temp\microsoftedgewebview2setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7528C:\Users\admin\AppData\Local\Temp\EUF426.tmp\MicrosoftEdgeUpdate.exe /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"C:\Users\admin\AppData\Local\Temp\EUF426.tmp\MicrosoftEdgeUpdate.exe
MicrosoftEdgeWebview2Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Version:
1.3.195.43
Modules
Images
c:\users\admin\appdata\local\temp\euf426.tmp\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
7556"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserverC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.195.43
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
7580"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exe" /user C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateComRegisterShell64.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update COM Registration Helper
Exit code:
0
Version:
1.3.195.43
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\1.3.195.43\microsoftedgeupdatecomregistershell64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
13 531
Read events
12 264
Write events
1 233
Delete events
34

Modification events

(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:delete valueName:eulaaccepted
Value:
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /uninstall
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.195.43
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\Clients\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:name
Value:
Microsoft Edge Update
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}
Operation:writeName:pv
Value:
1.3.195.43
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Microsoft Edge Update
Value:
"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\1.3.195.43\MicrosoftEdgeUpdateCore.exe"
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:edgeupdate_task_name_c
Value:
MicrosoftEdgeUpdateTaskUserS-1-5-21-1693682860-607145093-2874071422-1001Core{A0274ACE-758D-45F2-96EE-ADF41E50C5CC}
(PID) Process:(7528) MicrosoftEdgeUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate
Operation:writeName:edgeupdate_task_name_ua
Value:
MicrosoftEdgeUpdateTaskUserS-1-5-21-1693682860-607145093-2874071422-1001UA{57179283-63EB-4444-9359-8DC848A0BC1D}
(PID) Process:(7580) MicrosoftEdgeUpdateComRegisterShell64.exeKey:HKEY_CLASSES_ROOT\CLSID\{60B746FF-B482-4E3E-92AF-4C285E3E71A3}\InprocHandler32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
204
Suspicious files
5
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
300Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\luna\Luna.dllexecutable
MD5:3A87FB61F757BC7F8AAA333663A55C78
SHA256:5EA93E328A9D7CB9230ACDDC01B38DC09F3B94792F81F9DB8CA3D30185A94C74
300Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\luna\Luna.exeexecutable
MD5:9226E1FCF799F5B1D0DBAD674C3856DD
SHA256:5981E0CE9D4ECCA3F5E23A994E223C2686E035E2A753E277F3F30C425426DE43
300Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\config.jsonbinary
MD5:B937DEBBB5606F4C3F4AE9E3C56DAE96
SHA256:023E6C4AEDD79C0C28746A125D7F31D39F37C992CCDAE64E58965CB979BB9465
300Bootstrapper.exeC:\Users\admin\AppData\Local\Temp\downloads\Luna.zipcompressed
MD5:BAC8D83B1C753768720DF2E31B840B9F
SHA256:0759BDF6D5B3AC8C59F1B14265ABE5341537DE86CA863BE072218C0119987CD1
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF426.tmp\EdgeUpdate.datbinary
MD5:369BBC37CFF290ADB8963DC5E518B9B8
SHA256:3D7EC761BEF1B1AF418B909F1C81CE577C769722957713FDAFBC8131B0A0C7D3
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF426.tmp\psmachine_64.dllexecutable
MD5:886D71AA7EA1C34644AA759FB5A09B5F
SHA256:95D1B924759B36FBD2A20682E919392D64DC8C1B153F909F921DA7E57825A04C
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF426.tmp\MicrosoftEdgeComRegisterShellARM64.exeexecutable
MD5:8F7C44E937ECC243D05EAB5BB218440B
SHA256:BC3CDD57A892CE1841787061E23E526AD46575460CD66C1DC6DCF0F811563D59
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF426.tmp\psmachine_arm64.dllexecutable
MD5:EC69BFAF00836707975CC8ADB1E8F000
SHA256:744860280846486104FFFECF012F1502F024B142FC3FCE17BCA581B7D50DAAF0
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF426.tmp\psuser_arm64.dllexecutable
MD5:468C6DAED548F7D1D446F84ABCE85BBA
SHA256:01E37D6A07318D67CE22A898B52E3EED6AE990520303D2E36446B34255D298B0
7504MicrosoftEdgeWebview2Setup.exeC:\Users\admin\AppData\Local\Temp\EUF426.tmp\psuser_64.dllexecutable
MD5:83948D9F4EFEAFF99EBBFF72E50B5FD6
SHA256:422817534059F23CC43950CA02B93575B9D9F96A1CED03F1AC3D8126C6F5C53B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
35
DNS requests
21
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1052
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7864
svchost.exe
GET
23.50.131.74:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b7450c20-0f92-41df-9f93-8574ad303ce3?P1=1741977531&P2=404&P3=2&P4=NLnQUJrstO4MSEAXz4fwG0ryRJCeAvvxyQb1d31%2bHAkSjXnHQG%2fsieAZNFAYmOsFne3YpYtt93zq%2bkcUk09HDw%3d%3d
unknown
whitelisted
7864
svchost.exe
HEAD
200
23.50.131.74:80
http://msedge.f.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b7450c20-0f92-41df-9f93-8574ad303ce3?P1=1741977531&P2=404&P3=2&P4=NLnQUJrstO4MSEAXz4fwG0ryRJCeAvvxyQb1d31%2bHAkSjXnHQG%2fsieAZNFAYmOsFne3YpYtt93zq%2bkcUk09HDw%3d%3d
unknown
whitelisted
8104
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8104
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
300
Bootstrapper.exe
140.82.121.6:443
api.github.com
GITHUB
US
whitelisted
300
Bootstrapper.exe
140.82.121.4:443
github.com
GITHUB
US
whitelisted
300
Bootstrapper.exe
185.199.108.133:443
objects.githubusercontent.com
FASTLY
US
whitelisted
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1052
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.238
whitelisted
api.github.com
  • 140.82.121.6
whitelisted
github.com
  • 140.82.121.4
whitelisted
objects.githubusercontent.com
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.110.133
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.66
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.67
  • 20.190.160.130
  • 20.190.160.14
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.111.133
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
7864
svchost.exe
Misc activity
ET INFO Packed Executable Download
No debug info