File name:

SKlauncher-3.2.12_Setup.exe

Full analysis: https://app.any.run/tasks/422972e4-2133-448a-b0a1-b0737ad5a723
Verdict: Malicious activity
Analysis date: April 28, 2025, 03:20:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
inno
installer
delphi
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

79E973D7CF9069F758DD382BEE60EE43

SHA1:

0D1C6BF48EC6BE84C2648575DB5DC819E47D2ECC

SHA256:

8B0DF603574C14809359A81518261055D491863A28F3C32A4832CE547874792C

SSDEEP:

98304:F6GavilkMy3QFNbRm2XBN8VWBZSFOR4Onu81bwiSbfAD/YRMc3BsGVnuS0CxuZS7:DYFanFlUXeW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
    • Executable content was dropped or overwritten

      • SKlauncher-3.2.12_Setup.exe (PID: 1660)
      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • 7za.exe (PID: 4464)
      • javaw.exe (PID: 2100)
    • Drops 7-zip archiver for unpacking

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
    • Process drops legitimate windows executable

      • 7za.exe (PID: 4464)
      • javaw.exe (PID: 2100)
    • The process drops C-runtime libraries

      • 7za.exe (PID: 4464)
      • javaw.exe (PID: 2100)
  • INFO

    • Checks supported languages

      • SKlauncher-3.2.12_Setup.exe (PID: 1660)
      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • 7za.exe (PID: 4464)
      • javaw.exe (PID: 2100)
    • Create files in a temporary directory

      • SKlauncher-3.2.12_Setup.exe (PID: 1660)
      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • javaw.exe (PID: 2100)
    • Reads the software policy settings

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
    • Reads the computer name

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • 7za.exe (PID: 4464)
      • javaw.exe (PID: 2100)
    • Checks proxy server information

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
    • Detects InnoSetup installer (YARA)

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • SKlauncher-3.2.12_Setup.exe (PID: 1660)
    • Compiled with Borland Delphi (YARA)

      • SKlauncher-3.2.12_Setup.exe (PID: 1660)
      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
    • Creates files or folders in the user directory

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • 7za.exe (PID: 4464)
      • javaw.exe (PID: 2100)
    • The sample compiled with english language support

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
      • javaw.exe (PID: 2100)
      • 7za.exe (PID: 4464)
    • Creates a software uninstall entry

      • SKlauncher-3.2.12_Setup.tmp (PID: 6944)
    • Reads CPU info

      • javaw.exe (PID: 2100)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 2100)
    • Reads Environment values

      • javaw.exe (PID: 2100)
    • Process checks computer location settings

      • javaw.exe (PID: 2100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (65.1)
.exe | Win32 EXE PECompact compressed (generic) (24.6)
.dll | Win32 Dynamic Link Library (generic) (3.9)
.exe | Win32 Executable (generic) (2.6)
.exe | Win16/32 Executable Delphi generic (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:08 15:36:35+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 684032
InitializedDataSize: 118784
UninitializedDataSize: -
EntryPoint: 0xa7f98
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 3.2.12.0
ProductVersionNumber: 3.2.12.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: skmedix.pl
FileDescription: SKlauncher 3.2 Setup
FileVersion: 3.2.12.0
LegalCopyright:
OriginalFileName:
ProductName: SKlauncher 3.2
ProductVersion: 3.2.12.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sklauncher-3.2.12_setup.exe sklauncher-3.2.12_setup.tmp sppextcomobj.exe no specs slui.exe no specs 7za.exe conhost.exe no specs javaw.exe reg.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1660"C:\Users\admin\AppData\Local\Temp\SKlauncher-3.2.12_Setup.exe" C:\Users\admin\AppData\Local\Temp\SKlauncher-3.2.12_Setup.exe
explorer.exe
User:
admin
Company:
skmedix.pl
Integrity Level:
MEDIUM
Description:
SKlauncher 3.2 Setup
Exit code:
0
Version:
3.2.12.0
Modules
Images
c:\users\admin\appdata\local\temp\sklauncher-3.2.12_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2100"C:\Users\admin\AppData\Roaming\sklauncher\jre\bin\javaw.exe" -Xmx512M -jar "C:\Users\admin\AppData\Roaming\sklauncher\SKlauncher.jar"C:\Users\admin\AppData\Roaming\sklauncher\jre\bin\javaw.exe
SKlauncher-3.2.12_Setup.tmp
User:
admin
Company:
Eclipse Adoptium
Integrity Level:
MEDIUM
Description:
OpenJDK Platform binary
Version:
21.0.6.0
Modules
Images
c:\users\admin\appdata\roaming\sklauncher\jre\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\roaming\sklauncher\jre\bin\vcruntime140.dll
c:\users\admin\appdata\roaming\sklauncher\jre\bin\jli.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
3008\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe7za.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3900reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v AppsUseLightThemeC:\Windows\System32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4464"C:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\7za.exe" x -y C:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\jre.zipC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\7za.exe
SKlauncher-3.2.12_Setup.tmp
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
24.09
Modules
Images
c:\users\admin\appdata\local\temp\is-6noge.tmp\7za.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4920"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5972C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6944"C:\Users\admin\AppData\Local\Temp\is-2QJ3O.tmp\SKlauncher-3.2.12_Setup.tmp" /SL5="$60276,2553666,803840,C:\Users\admin\AppData\Local\Temp\SKlauncher-3.2.12_Setup.exe" C:\Users\admin\AppData\Local\Temp\is-2QJ3O.tmp\SKlauncher-3.2.12_Setup.tmp
SKlauncher-3.2.12_Setup.exe
User:
admin
Company:
skmedix.pl
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-2qj3o.tmp\sklauncher-3.2.12_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
1 273
Read events
1 250
Write events
23
Delete events
0

Modification events

(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.4.0
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Users\admin\AppData\Roaming\sklauncher
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Roaming\sklauncher\
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
SKlauncher
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: Language
Value:
default
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:DisplayName
Value:
SKlauncher 3.2
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\sklauncher\icon.ico
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\sklauncher\unins000.exe"
(PID) Process:(6944) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\sklauncher\unins000.exe" /SILENT
Executable files
160
Suspicious files
43
Text files
232
Unknown types
0

Dropped files

PID
Process
Filename
Type
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\is-GGS1T.tmp
MD5:
SHA256:
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\jre.zip
MD5:
SHA256:
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\is-S26TN.tmptext
MD5:018677D1ACCC999F9ADCADF7E9D2ECA0
SHA256:A1F58B506C61EB64F9D38183FA7002A7FD5F7DBECB1F3BD16D1C5A7F181DF050
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\is-J6PF9.tmpcompressed
MD5:481E60FF6432B3816D78DD3A94D6C89B
SHA256:0AB89FA8531F5D6F1A15B6C76CF5A7D44E60E273932AD282B29B8DD324E725FF
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\is-5VIJF.tmptext
MD5:CB19A3834C52905BBC7AAE9B0CB884D8
SHA256:D8E035498BA5918ACB7899067177FDEFB3300D7690419EC6B564E49902AB0160
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\javafx-1.jar.sha1text
MD5:CB19A3834C52905BBC7AAE9B0CB884D8
SHA256:D8E035498BA5918ACB7899067177FDEFB3300D7690419EC6B564E49902AB0160
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\javafx-2.jarcompressed
MD5:481E60FF6432B3816D78DD3A94D6C89B
SHA256:0AB89FA8531F5D6F1A15B6C76CF5A7D44E60E273932AD282B29B8DD324E725FF
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\is-AUG0G.tmpcompressed
MD5:239410D2A0EBE901C2BAED127E865453
SHA256:90E581C31638FBB041015C360D9EC6083AF7B666AC08EF03CD94CF274447F614
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\javafx-0.jarcompressed
MD5:239410D2A0EBE901C2BAED127E865453
SHA256:90E581C31638FBB041015C360D9EC6083AF7B666AC08EF03CD94CF274447F614
6944SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-6NOGE.tmp\javafx-2.jar.sha1text
MD5:716529FC440CCAC9B9C853DA3CDAF779
SHA256:D147881DC89769B2B4C524D01A1E498AA228ECA808F18755A5F1EA1742B00546
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
48
DNS requests
28
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
23.52.56.216:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
92.123.106.40:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2516
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2516
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
92.123.106.40:80
crl.microsoft.com
TELECOM ITALIA SPARKLE S.p.A.
IT
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
23.52.56.216:80
ocsp.digicert.com
AKAMAI-AS
NL
whitelisted
6944
SKlauncher-3.2.12_Setup.tmp
140.82.121.3:443
github.com
GITHUB
US
whitelisted
6944
SKlauncher-3.2.12_Setup.tmp
185.199.110.133:443
objects.githubusercontent.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 92.123.106.40
  • 92.123.106.75
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.200.189.225
whitelisted
google.com
  • 142.250.186.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.128
  • 20.190.159.4
  • 40.126.31.131
  • 40.126.31.130
  • 20.190.159.131
  • 20.190.159.130
  • 40.126.31.2
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 23.52.56.216
whitelisted
github.com
  • 140.82.121.3
whitelisted
objects.githubusercontent.com
  • 185.199.110.133
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.111.133
whitelisted
repo1.maven.org
  • 146.75.120.209
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

PID
Process
Class
Message
2100
javaw.exe
Misc activity
ET INFO Observed Google DNS over HTTPS Domain (dns .google in TLS SNI)
No debug info