File name:

SKlauncher-3.2.12_Setup.exe

Full analysis: https://app.any.run/tasks/93229883-06c0-4225-8560-3da77f64bc9e
Verdict: Malicious activity
Analysis date: May 18, 2025, 16:42:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

79E973D7CF9069F758DD382BEE60EE43

SHA1:

0D1C6BF48EC6BE84C2648575DB5DC819E47D2ECC

SHA256:

8B0DF603574C14809359A81518261055D491863A28F3C32A4832CE547874792C

SSDEEP:

98304:F6GavilkMy3QFNbRm2XBN8VWBZSFOR4Onu81bwiSbfAD/YRMc3BsGVnuS0CxuZS7:DYFanFlUXeW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • SKlauncher-3.2.12_Setup.exe (PID: 2432)
      • javaw.exe (PID: 2800)
      • 7za.exe (PID: 6516)
    • Reads the Windows owner or organization settings

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
    • Drops 7-zip archiver for unpacking

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
    • Process drops legitimate windows executable

      • 7za.exe (PID: 6516)
      • javaw.exe (PID: 2800)
    • The process drops C-runtime libraries

      • 7za.exe (PID: 6516)
      • javaw.exe (PID: 2800)
  • INFO

    • Checks supported languages

      • SKlauncher-3.2.12_Setup.exe (PID: 2432)
      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • 7za.exe (PID: 6516)
      • javaw.exe (PID: 2800)
    • Create files in a temporary directory

      • SKlauncher-3.2.12_Setup.exe (PID: 2432)
      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • javaw.exe (PID: 2800)
    • Reads the software policy settings

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
    • Checks proxy server information

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
    • Reads the computer name

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • 7za.exe (PID: 6516)
      • javaw.exe (PID: 2800)
    • Detects InnoSetup installer (YARA)

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • SKlauncher-3.2.12_Setup.exe (PID: 2432)
    • Compiled with Borland Delphi (YARA)

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • SKlauncher-3.2.12_Setup.exe (PID: 2432)
    • The sample compiled with english language support

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • 7za.exe (PID: 6516)
      • javaw.exe (PID: 2800)
    • Creates files or folders in the user directory

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
      • 7za.exe (PID: 6516)
      • javaw.exe (PID: 2800)
    • Creates a software uninstall entry

      • SKlauncher-3.2.12_Setup.tmp (PID: 4628)
    • Reads CPU info

      • javaw.exe (PID: 2800)
    • Reads Environment values

      • javaw.exe (PID: 2800)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 2800)
    • Process checks computer location settings

      • javaw.exe (PID: 2800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (65.1)
.exe | Win32 EXE PECompact compressed (generic) (24.6)
.dll | Win32 Dynamic Link Library (generic) (3.9)
.exe | Win32 Executable (generic) (2.6)
.exe | Win16/32 Executable Delphi generic (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:08 15:36:35+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 684032
InitializedDataSize: 118784
UninitializedDataSize: -
EntryPoint: 0xa7f98
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 3.2.12.0
ProductVersionNumber: 3.2.12.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: skmedix.pl
FileDescription: SKlauncher 3.2 Setup
FileVersion: 3.2.12.0
LegalCopyright:
OriginalFileName:
ProductName: SKlauncher 3.2
ProductVersion: 3.2.12.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sklauncher-3.2.12_setup.exe sklauncher-3.2.12_setup.tmp sppextcomobj.exe no specs slui.exe no specs 7za.exe conhost.exe no specs javaw.exe reg.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2432"C:\Users\admin\AppData\Local\Temp\SKlauncher-3.2.12_Setup.exe" C:\Users\admin\AppData\Local\Temp\SKlauncher-3.2.12_Setup.exe
explorer.exe
User:
admin
Company:
skmedix.pl
Integrity Level:
MEDIUM
Description:
SKlauncher 3.2 Setup
Exit code:
0
Version:
3.2.12.0
Modules
Images
c:\users\admin\appdata\local\temp\sklauncher-3.2.12_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2800"C:\Users\admin\AppData\Roaming\sklauncher\jre\bin\javaw.exe" -Xmx512M -jar "C:\Users\admin\AppData\Roaming\sklauncher\SKlauncher.jar"C:\Users\admin\AppData\Roaming\sklauncher\jre\bin\javaw.exe
SKlauncher-3.2.12_Setup.tmp
User:
admin
Company:
Eclipse Adoptium
Integrity Level:
MEDIUM
Description:
OpenJDK Platform binary
Version:
21.0.6.0
Modules
Images
c:\users\admin\appdata\roaming\sklauncher\jre\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\roaming\sklauncher\jre\bin\jli.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3268\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3900C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4628"C:\Users\admin\AppData\Local\Temp\is-R4GGN.tmp\SKlauncher-3.2.12_Setup.tmp" /SL5="$6034C,2553666,803840,C:\Users\admin\AppData\Local\Temp\SKlauncher-3.2.12_Setup.exe" C:\Users\admin\AppData\Local\Temp\is-R4GGN.tmp\SKlauncher-3.2.12_Setup.tmp
SKlauncher-3.2.12_Setup.exe
User:
admin
Company:
skmedix.pl
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-r4ggn.tmp\sklauncher-3.2.12_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5800"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6516"C:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\7za.exe" x -y C:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\jre.zipC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\7za.exe
SKlauncher-3.2.12_Setup.tmp
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
24.09
Modules
Images
c:\users\admin\appdata\local\temp\is-1tt38.tmp\7za.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6724\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe7za.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7012reg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v AppsUseLightThemeC:\Windows\System32\reg.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
1 273
Read events
1 250
Write events
23
Delete events
0

Modification events

(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.4.0
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Users\admin\AppData\Roaming\sklauncher
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Roaming\sklauncher\
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
SKlauncher
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:Inno Setup: Language
Value:
default
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:DisplayName
Value:
SKlauncher 3.2
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Roaming\sklauncher\icon.ico
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Roaming\sklauncher\unins000.exe"
(PID) Process:(4628) SKlauncher-3.2.12_Setup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{A151427E-7A46-4D6D-8534-C4C04BADA77A}_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Roaming\sklauncher\unins000.exe" /SILENT
Executable files
160
Suspicious files
43
Text files
232
Unknown types
0

Dropped files

PID
Process
Filename
Type
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\is-VG10K.tmp
MD5:
SHA256:
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\jre.zip
MD5:
SHA256:
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\is-9KNKA.tmpcompressed
MD5:481E60FF6432B3816D78DD3A94D6C89B
SHA256:0AB89FA8531F5D6F1A15B6C76CF5A7D44E60E273932AD282B29B8DD324E725FF
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\javafx-2.jar.sha1text
MD5:716529FC440CCAC9B9C853DA3CDAF779
SHA256:D147881DC89769B2B4C524D01A1E498AA228ECA808F18755A5F1EA1742B00546
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\is-L04QH.tmptext
MD5:716529FC440CCAC9B9C853DA3CDAF779
SHA256:D147881DC89769B2B4C524D01A1E498AA228ECA808F18755A5F1EA1742B00546
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\is-LG5LQ.tmpcompressed
MD5:6AD87D83A49A3B25FB5E137038B2C5DE
SHA256:6828F4FD83AC7CAEB7E25C21E4050606D384BAEBB18BC3B1F35CD866020757CC
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\is-QM82M.tmptext
MD5:018677D1ACCC999F9ADCADF7E9D2ECA0
SHA256:A1F58B506C61EB64F9D38183FA7002A7FD5F7DBECB1F3BD16D1C5A7F181DF050
2432SKlauncher-3.2.12_Setup.exeC:\Users\admin\AppData\Local\Temp\is-R4GGN.tmp\SKlauncher-3.2.12_Setup.tmpexecutable
MD5:A1140E85CA5E398094523B5D65DE46CB
SHA256:FA266F1B259C8BF7D2E3C2FAD19DA5390D90D01CAB3743EF1E18A9A8C89338E0
4628SKlauncher-3.2.12_Setup.tmpC:\Users\admin\AppData\Local\Temp\is-1TT38.tmp\_isetup\_isdecmp.dllexecutable
MD5:077CB4461A2767383B317EB0C50F5F13
SHA256:8287D0E287A66EE78537C8D1D98E426562B95C50F569B92CEA9CE36A9FA57E64
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
47
DNS requests
30
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
896
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
896
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
unknown
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4628
SKlauncher-3.2.12_Setup.tmp
140.82.121.3:443
github.com
GITHUB
US
whitelisted
4628
SKlauncher-3.2.12_Setup.tmp
185.199.110.133:443
objects.githubusercontent.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
google.com
  • 142.250.74.206
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.73
  • 20.190.159.128
  • 20.190.159.131
  • 40.126.31.69
  • 20.190.159.75
  • 40.126.31.130
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
github.com
  • 140.82.121.3
whitelisted
objects.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.108.133
whitelisted
repo1.maven.org
  • 199.232.192.209
  • 199.232.196.209
whitelisted

Threats

PID
Process
Class
Message
2800
javaw.exe
Misc activity
ET INFO Observed Google DNS over HTTPS Domain (dns .google in TLS SNI)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
No debug info