File name:

Microstub.exe

Full analysis: https://app.any.run/tasks/c14a93a0-2d77-4ea3-8eeb-c71e80b6876e
Verdict: Malicious activity
Analysis date: December 20, 2023, 11:58:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

0CCDF8EDAF3A0FB11856FEE1690E2957

SHA1:

ECCB8847CA5B42E9EA85B3EB96141899D47856E8

SHA256:

A90757A87FFA192188C71D2AAEB7CC2D7758E7BAAEE7E1344D33A6C257884F10

SSDEEP:

3072:MhrEcYTuZF3sDmYFDL56DLiSNMWm5RC3Oy1jjHfJWcCAnzuVmoP7wxi6yd+gf8+A:UYTuZFuB66SBRHJWcPz8/JrL9+9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Microstub.exe (PID: 2420)
      • icarus.exe (PID: 1840)
      • aswOfferTool.exe (PID: 2580)
      • aswOfferTool.exe (PID: 1904)
      • icarus.exe (PID: 2096)
      • avg_antivirus_free_online_setup.exe (PID: 1044)
    • Creates a writable file in the system directory

      • icarus.exe (PID: 2096)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • Microstub.exe (PID: 2420)
      • avg_antivirus_free_online_setup.exe (PID: 1044)
    • Starts itself from another location

      • icarus.exe (PID: 1840)
      • aswOfferTool.exe (PID: 2580)
    • The process creates files with name similar to system file names

      • icarus.exe (PID: 2096)
    • The process verifies whether the antivirus software is installed

      • icarus.exe (PID: 2096)
  • INFO

    • Reads the machine GUID from the registry

      • Microstub.exe (PID: 2420)
      • icarus.exe (PID: 1840)
      • icarus_ui.exe (PID: 1936)
      • icarus.exe (PID: 2096)
      • icarus.exe (PID: 1748)
      • avg_antivirus_free_online_setup.exe (PID: 1044)
    • Checks supported languages

      • Microstub.exe (PID: 2420)
      • icarus.exe (PID: 1840)
      • icarus_ui.exe (PID: 1936)
      • icarus.exe (PID: 2096)
      • icarus.exe (PID: 1748)
      • aswOfferTool.exe (PID: 2580)
      • aswOfferTool.exe (PID: 1904)
      • avg_antivirus_free_online_setup.exe (PID: 1044)
    • Creates files in the program directory

      • icarus.exe (PID: 1840)
      • icarus_ui.exe (PID: 1936)
      • icarus.exe (PID: 2096)
      • avg_antivirus_free_online_setup.exe (PID: 1044)
    • Create files in a temporary directory

      • icarus.exe (PID: 1840)
      • icarus.exe (PID: 2096)
      • icarus.exe (PID: 1748)
    • Reads CPU info

      • icarus.exe (PID: 1840)
      • icarus_ui.exe (PID: 1936)
      • icarus.exe (PID: 1748)
      • icarus.exe (PID: 2096)
    • Reads the computer name

      • Microstub.exe (PID: 2420)
      • avg_antivirus_free_online_setup.exe (PID: 1044)
      • icarus.exe (PID: 1748)
      • icarus.exe (PID: 2096)
      • icarus_ui.exe (PID: 1936)
      • aswOfferTool.exe (PID: 2580)
      • icarus.exe (PID: 1840)
    • Dropped object may contain TOR URL's

      • icarus.exe (PID: 1840)
      • aswOfferTool.exe (PID: 2580)
      • icarus.exe (PID: 2096)
    • Reads Environment values

      • icarus.exe (PID: 2096)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:12 10:36:29+02:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 137216
InitializedDataSize: 89088
UninitializedDataSize: -
EntryPoint: 0x1020
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 2.1.99.0
ProductVersionNumber: 2.1.99.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: AVG Technologies CZ, s.r.o.
Edition: 15
FileDescription: AVG Installer
FileVersion: 2.1.99.0
InternalName: microstub
LegalCopyright: Copyright (C) 2023 AVG Technologies CZ, s.r.o.
OriginalFileName: microstub.exe
ProductName: AVG
ProductVersion: 2.1.99.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
9
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start microstub.exe avg_antivirus_free_online_setup.exe icarus.exe icarus_ui.exe no specs icarus.exe icarus.exe no specs aswoffertool.exe no specs aswoffertool.exe no specs microstub.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Users\admin\AppData\Local\Temp\Microstub.exe" C:\Users\admin\AppData\Local\Temp\Microstub.exeexplorer.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
MEDIUM
Description:
AVG Installer
Exit code:
3221226540
Version:
2.1.99.0
Modules
Images
c:\users\admin\appdata\local\temp\microstub.exe
c:\windows\system32\ntdll.dll
1044"C:\Windows\Temp\asw.e3622f9737cc4f66\avg_antivirus_free_online_setup.exe" /ga_clientid:236e9bfa-818a-48f5-a012-b4727845d2e2 /edat_dir:C:\Windows\Temp\asw.e3622f9737cc4f66C:\Windows\Temp\asw.e3622f9737cc4f66\avg_antivirus_free_online_setup.exe
Microstub.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
HIGH
Description:
AVG Self-Extract Package
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\windows\temp\asw.e3622f9737cc4f66\avg_antivirus_free_online_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1748C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av-vps\icarus.exe /track-guid:236e9bfa-818a-48f5-a012-b4727845d2e2 /edat_dir:C:\Windows\Temp\asw.e3622f9737cc4f66 /sssid:1044 /er_master:master_ep_9baada18-4d08-4054-b5fc-4813aec99912 /er_ui:ui_ep_bae00da9-05aa-4eb7-a9aa-bddf2a93a577 /er_slave:avg-av-vps_slave_ep_a2361223-798d-4172-a3c4-5bdc2b9d0ded /slave:avg-av-vpsC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av-vps\icarus.exeicarus.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
HIGH
Description:
AVG Installer
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\windows\temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av-vps\icarus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1840C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\icarus-info.xml /install /track-guid:236e9bfa-818a-48f5-a012-b4727845d2e2 /edat_dir:C:\Windows\Temp\asw.e3622f9737cc4f66 /sssid:1044C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus.exe
avg_antivirus_free_online_setup.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
HIGH
Description:
AVG Installer
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\windows\temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1904"C:\Users\Public\Documents\aswOfferTool.exe" -checkChromeReactivation -bc=AWFAC:\Users\Public\Documents\aswOfferTool.exeaswOfferTool.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
MEDIUM
Description:
AVG Offer Installation Tool
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\users\public\documents\aswoffertool.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\shell32.dll
1936C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus_ui.exe /track-guid:236e9bfa-818a-48f5-a012-b4727845d2e2 /edat_dir:C:\Windows\Temp\asw.e3622f9737cc4f66 /sssid:1044 /er_master:master_ep_9baada18-4d08-4054-b5fc-4813aec99912 /er_ui:ui_ep_bae00da9-05aa-4eb7-a9aa-bddf2a93a577C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus_ui.exeicarus.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
HIGH
Description:
AVG UI
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\windows\temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus_ui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\profapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\shell32.dll
2096C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\icarus.exe /track-guid:236e9bfa-818a-48f5-a012-b4727845d2e2 /edat_dir:C:\Windows\Temp\asw.e3622f9737cc4f66 /sssid:1044 /er_master:master_ep_9baada18-4d08-4054-b5fc-4813aec99912 /er_ui:ui_ep_bae00da9-05aa-4eb7-a9aa-bddf2a93a577 /er_slave:avg-av_slave_ep_093b8b51-4796-492a-ac8b-da30f56e51f3 /slave:avg-avC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\icarus.exe
icarus.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
HIGH
Description:
AVG Installer
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\windows\temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\icarus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2420"C:\Users\admin\AppData\Local\Temp\Microstub.exe" C:\Users\admin\AppData\Local\Temp\Microstub.exe
explorer.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Installer
Exit code:
0
Version:
2.1.99.0
Modules
Images
c:\users\admin\appdata\local\temp\microstub.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2580"C:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\aswOfferTool.exe" -checkChromeReactivation -elevated -bc=AWFAC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\aswOfferTool.exeicarus.exe
User:
admin
Company:
AVG Technologies
Integrity Level:
HIGH
Description:
AVG Offer Installation Tool
Exit code:
0
Version:
23.8.6421.0
Modules
Images
c:\windows\temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\aswoffertool.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\shell32.dll
Total events
7 356
Read events
7 317
Write events
39
Delete events
0

Modification events

(PID) Process:(2420) Microstub.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Windows\Temp\asw.e3622f9737cc4f66
(PID) Process:(2420) Microstub.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1044) avg_antivirus_free_online_setup.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2096) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
Operation:writeName:144807F0-DE37-4C62-9C05-EB4CC64A7A2F
Value:
29cbdeb3-95b4-4827-b366-31f436c7f583
(PID) Process:(2096) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
Operation:writeName:56C7A9DA-4B11-406A-8B1A-EFF157C294D6
Value:
29cbdeb3-95b4-4827-b366-31f436c7f583
(PID) Process:(1748) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
Operation:writeName:144807F0-DE37-4C62-9C05-EB4CC64A7A2F
Value:
29cbdeb3-95b4-4827-b366-31f436c7f583
(PID) Process:(1748) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
Operation:writeName:56C7A9DA-4B11-406A-8B1A-EFF157C294D6
Value:
29cbdeb3-95b4-4827-b366-31f436c7f583
(PID) Process:(1748) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
Operation:writeName:5FD38555-4B16-40AE-9A09-E2C969CB74AF
Value:
138F65F3DE11A9670C8CF1AB7F8C2DEC
(PID) Process:(1748) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\C06AEB9D-8774-46E7-8160-8321BCD14D9F
Operation:writeName:7CCD586D-2ABC-42FF-A23B-3731F4F183D9
Value:
138F65F3DE11A9670C8CF1AB7F8C2DEC
(PID) Process:(2096) icarus.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\1D0EC6DE-4A80-4CC3-A335-E6E41C951198
Operation:writeName:5FD38555-4B16-40AE-9A09-E2C969CB74AF
Value:
138F65F3DE11A9670C8CF1AB7F8C2DEC
Executable files
98
Suspicious files
32
Text files
75
Unknown types
0

Dropped files

PID
Process
Filename
Type
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus_mod.dllexecutable
MD5:D82C7E7541B0FB4BCC07230A464110F3
SHA256:787F09B46F996C1835532A9A0BD03D3D02BA200655F59D09067AEA164E581FF7
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\85b1fef7-fa2e-43b2-91e3-7645d314d6e2binary
MD5:8A0ECC6639E0E218CD4D3F3B840C28D2
SHA256:85FB4F9ECE8E51F33643F3A9FC9E8159C4C5836113B77ED1466E1F7B6ABDAC3C
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\7e6205e1-8a8c-40ce-ba79-f9a3ae68b092binary
MD5:D354234E9230850AC1018529099B5C9C
SHA256:EFA35BE97D4C194659B5B1CE120E69F431D5B67B83F81B4140ABC14D8FDDAE3E
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\bug_report.exeexecutable
MD5:9672D59B4F4FD4083FACDB53DDC4A83E
SHA256:A1A69486E716550834B0D28E07ED55412157B671B90AEE545EA57649F90AFBDA
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\icarus.exeexecutable
MD5:74304FACCD7A95FFF290B0A8AD15EE88
SHA256:8639967DFE4310D2C942052A45E0C47D7AB4EF6A0EC245AA67DF3A01E81E07A9
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\avg-av\config.def.edattext
MD5:389208736E18C263FD3AD72311DEBF18
SHA256:BDBCC9120388FCE0A244AB58EAB7B04A127C45D973CC63C556621A882FD189D4
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\7a2d4fdd-2e95-4ccb-9082-989c50eecf01binary
MD5:4C6ADE41D53BAE584644744F2E6A232F
SHA256:B880331FE25923DF07B3F4110C52D2387F4EFD3B2AEE4B9948BE253D3CCD3EA4
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\9a29df96-dd3f-48e6-a085-e6e71cfa7deebinary
MD5:4873B4A1C60C5210BF0EDEC1D2026E03
SHA256:0FC29E8B24E13179EDD2268052933B4F0DB19AF8C589F86A14EC642CE8279C5E
1840icarus.exeC:\ProgramData\AVG\Icarus\Logs\report.log
MD5:
SHA256:
1044avg_antivirus_free_online_setup.exeC:\Windows\Temp\asw-d08e84d0-bc78-4575-b073-0dc7d76667a2\common\setupui.contbinary
MD5:CAEC84795D36C4FEE0531BD5909CD57F
SHA256:20BE6A7EC202B19F740F397C6BEF348851560FB3CCD60B0B2F0DF90A8E5C192F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
31
DNS requests
35
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2420
Microstub.exe
POST
204
34.117.223.223:80
http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi
unknown
unknown
2420
Microstub.exe
POST
200
216.239.38.178:80
http://www.google-analytics.com/collect
unknown
image
35 b
unknown
2420
Microstub.exe
POST
200
216.239.38.178:80
http://www.google-analytics.com/collect
unknown
image
35 b
unknown
2420
Microstub.exe
POST
204
34.117.223.223:80
http://v7event.stats.avast.com/cgi-bin/iavsevents.cgi
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2420
Microstub.exe
34.117.223.223:80
v7event.stats.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2420
Microstub.exe
216.239.38.178:80
www.google-analytics.com
GOOGLE
US
unknown
2420
Microstub.exe
2.18.161.23:443
honzik.avcdn.net
AKAMAI-AS
DE
unknown
1044
avg_antivirus_free_online_setup.exe
34.117.223.223:443
v7event.stats.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1044
avg_antivirus_free_online_setup.exe
2.18.161.23:443
honzik.avcdn.net
AKAMAI-AS
DE
unknown
1840
icarus.exe
34.117.223.223:443
v7event.stats.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1840
icarus.exe
34.160.176.28:443
shepherd.avcdn.net
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
www.google-analytics.com
  • 216.239.38.178
  • 216.239.32.178
  • 216.239.36.178
  • 216.239.34.178
whitelisted
honzik.avcdn.net
  • 2.18.161.23
  • 2a02:26f0:3500:59a::240d
  • 2a02:26f0:3500:595::240d
unknown
v7event.stats.avast.com
  • 34.117.223.223
whitelisted
analytics.avcdn.net
  • 34.117.223.223
unknown
shepherd.avcdn.net
  • 34.160.176.28
whitelisted

Threats

No threats detected
No debug info