File name:

Autoit3.exe

Full analysis: https://app.any.run/tasks/cdc6b6aa-e7c8-4894-b2b9-e3bd1481e23a
Verdict: Malicious activity
Threats:

DarkGate is a loader, which possesses extensive functionality, ranging from keylogging to crypto mining. Written in Delphi, this malware is known for the use of AutoIT scripts in its infection process. Thanks to this malicious software’s versatile architecture, it is widely used by established threat actors.

Analysis date: November 06, 2024, 06:01:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
darkgate
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

C56B5F0201A3B3DE53E561FE76912BFD

SHA1:

2A4062E10A5DE813F5688221DBEB3F3FF33EB417

SHA256:

237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D

SSDEEP:

12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • MicrosoftEdgeUpdateCore.exe (PID: 3156)
      • MicrosoftEdgeUpdateCore.exe (PID: 6868)
    • Runs injected code in another process

      • Autoit3.exe (PID: 6420)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • DARKGATE has been detected (YARA)

      • MicrosoftEdgeUpdateCore.exe (PID: 7072)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Autoit3.exe (PID: 6216)
    • The process verifies whether the antivirus software is installed

      • Autoit3.exe (PID: 6420)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • Starts CMD.EXE for commands execution

      • Autoit3.exe (PID: 6420)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 6808)
    • Accesses domain name via WMI (SCRIPT)

      • WMIC.exe (PID: 5276)
    • Executable content was dropped or overwritten

      • Autoit3.exe (PID: 6420)
    • Executes application which crashes

      • MicrosoftEdgeUpdateCore.exe (PID: 6868)
    • Application launched itself

      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
  • INFO

    • Reads mouse settings

      • Autoit3.exe (PID: 6216)
      • Autoit3.exe (PID: 6420)
    • Checks supported languages

      • Autoit3.exe (PID: 6216)
      • Autoit3.exe (PID: 6420)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
      • MicrosoftEdgeUpdateCore.exe (PID: 6868)
    • Reads Windows Product ID

      • Autoit3.exe (PID: 6420)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • Manual execution by a user

      • cmd.exe (PID: 3852)
    • Reads CPU info

      • Autoit3.exe (PID: 6420)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • Reads the computer name

      • Autoit3.exe (PID: 6216)
      • Autoit3.exe (PID: 6420)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • Creates files or folders in the user directory

      • Autoit3.exe (PID: 6420)
    • Creates files in the program directory

      • Autoit3.exe (PID: 6420)
      • cmd.exe (PID: 6808)
      • MicrosoftEdgeUpdateCore.exe (PID: 4040)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 5276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:03:15 13:14:39+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 583680
InitializedDataSize: 317440
UninitializedDataSize: -
EntryPoint: 0x27ffa
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 3.3.14.5
ProductVersionNumber: 3.3.14.5
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
CompanyName: AutoIt Team
Comments: http://www.autoitscript.com/autoit3/
FileDescription: AutoIt v3 Script
FileVersion: 3, 3, 14, 5
InternalName: AutoIt3.exe
LegalCopyright: ©1999-2018 Jonathan Bennett & AutoIt Team
OriginalFileName: AutoIt3.exe
ProductName: AutoIt v3 Script
ProductVersion: 3, 3, 14, 5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
12
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start autoit3.exe no specs cmd.exe conhost.exe no specs rundll32.exe no specs autoit3.exe cmd.exe no specs conhost.exe no specs wmic.exe no specs microsoftedgeupdatecore.exe #DARKGATE microsoftedgeupdatecore.exe microsoftedgeupdatecore.exe #DARKGATE microsoftedgeupdatecore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3156"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe
SystemSettings.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Version:
1.3.185.17
3852"C:\WINDOWS\system32\cmd.exe" C:\Windows\System32\cmd.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\wldp.dll
4040C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exeC:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.17\MicrosoftEdgeUpdateCore.exe
Autoit3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge Update
Version:
1.3.185.17
Modules
Images
c:\program files (x86)\microsoft\edgeupdate\1.3.185.17\microsoftedgeupdatecore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ole32.dll
c:\windows\syswow64\ucrtbase.dll
5160C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5276wmic ComputerSystem get domain C:\Windows\SysWOW64\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\iphlpapi.dll
6216"C:\Users\admin\Desktop\Autoit3.exe" C:\Users\admin\Desktop\Autoit3.exeexplorer.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
1
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\desktop\autoit3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6420Autoit3.exe "mytes2.au3"C:\Users\admin\Desktop\Autoit3.exe
cmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
HIGH
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\desktop\autoit3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
6724\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6808"c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bfdaebh\efkfaaeC:\Windows\SysWOW64\cmd.exeAutoit3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
4 437
Read events
4 402
Write events
34
Delete events
1

Modification events

(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0400000000000000030000000E000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4
Operation:writeName:MRUListEx
Value:
040000000000000005000000020000000100000003000000FFFFFFFF
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\119\Shell
Operation:writeName:SniffedFolderType
Value:
Documents
(PID) Process:(6216) Autoit3.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
96
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\119\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Operation:writeName:Mode
Value:
4
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\119\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Operation:writeName:LogicalViewMode
Value:
1
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\119\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Operation:writeName:FFlags
Value:
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\119\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Operation:writeName:IconSize
Value:
16
(PID) Process:(6216) Autoit3.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\119\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Operation:writeName:Sort
Value:
000000000000000000000000000000000100000030F125B7EF471A10A5F102608C9EEBAC0A00000001000000
Executable files
1
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
6420Autoit3.exeC:\temp\fkcbadctext
MD5:35465D086B65E6E300272EC2CC5D160D
SHA256:BB87B4A18476ADB4D14C216A4CEF235BD7025B5A4235A1E21B4E88BE21E95D48
6420Autoit3.exeC:\ProgramData\bfdaebh\Autoit3.exeexecutable
MD5:C56B5F0201A3B3DE53E561FE76912BFD
SHA256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
6808cmd.exeC:\ProgramData\bfdaebh\efkfaaetext
MD5:C8BBAD190EAAA9755C8DFB1573984D81
SHA256:7F136265128B7175FB67024A6DDD7524586B025725A878C07D76A9D8AD3DC2AC
6420Autoit3.exeC:\Users\admin\AppData\Roaming\KBEFBbDtext
MD5:9BAB60CDD690C8D682B97AC173B9856D
SHA256:EF15073CA1C73B7DE554D039579A86A51EFF5B0B00756A7127FCBD55CE96DE55
6420Autoit3.exeC:\temp\dcbeccatext
MD5:44EC85A70133CF280A14031477B639A9
SHA256:A5BAC4DFD6E677513ACBAB4AFD204E8493071C5AB12A78301A2B5B49865DFD51
4040MicrosoftEdgeUpdateCore.exeC:\temp\fhbaacatext
MD5:EDA871D51333BF57336E621C4FEFA604
SHA256:1A8094251D3C2AF331AD47C278F70AD0E5CB72D01A7A5C19093202A657C3B73D
4040MicrosoftEdgeUpdateCore.exeC:\ProgramData\bfdaebh\akfchbdbinary
MD5:B2AB4DFC77EA282EE15C03294EE29F30
SHA256:E2ECABD2CFDE615134629F3F8FAA6C6CEFACE910404F0E74C56353A7091FF04C
4040MicrosoftEdgeUpdateCore.exeC:\temp\dcbeccatext
MD5:FCE0CA06E4AF976FBB275C8B2AB2692E
SHA256:6E2E9179F7875E0975111863689BD9065FD8DABFF478A8B341D461C098766A6C
6420Autoit3.exeC:\ProgramData\bfdaebh\dbekkea.a3xbinary
MD5:D91891CAE02A24735853100A3511D74F
SHA256:E2C3B31EE3615E2F39843D035F1990B94C12AF1E42C34CE8E83C28B29C85567D
7072MicrosoftEdgeUpdateCore.exeC:\temp\fhbaacatext
MD5:5AFD89ACA4F5249219BACA65FC7F5CE9
SHA256:6C24A4DEBAB9B253281895741541C57531FD12CB19D5D703B4103125B0968B06
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
39
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
unknown
GET
200
23.200.161.157:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
GET
200
23.200.161.157:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
5488
MoUsoCoreWorker.exe
GET
200
104.85.249.160:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
4836
RUXIMICS.exe
GET
200
104.85.249.160:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
4836
RUXIMICS.exe
GET
200
23.200.161.157:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
5488
MoUsoCoreWorker.exe
GET
200
23.200.161.157:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
POST
62.233.57.80:80
http://44-35-63-31.internalsakamai.net/
unknown
unknown
POST
62.233.57.80:80
http://44-35-63-31.internalsakamai.net/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:137
unknown
4836
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
5488
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4360
SearchApp.exe
2.18.29.177:443
www.bing.com
Akamai International B.V.
PL
unknown
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
5488
MoUsoCoreWorker.exe
104.85.249.160:80
crl.microsoft.com
Akamai International B.V.
PL
unknown
4836
RUXIMICS.exe
104.85.249.160:80
crl.microsoft.com
Akamai International B.V.
PL
unknown
5488
MoUsoCoreWorker.exe
23.200.161.157:80
www.microsoft.com
AKAMAI-AS
PL
unknown
4836
RUXIMICS.exe
23.200.161.157:80
www.microsoft.com
AKAMAI-AS
PL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 13.71.55.58
unknown
www.bing.com
  • 2.18.29.177
unknown
crl.microsoft.com
  • 104.85.249.160
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
google.com
  • 142.250.186.206
unknown
www.microsoft.com
  • 23.200.161.157
unknown
r.bing.com
  • 2.18.29.161
unknown
browser.pipe.aria.microsoft.com
  • 13.89.179.11
unknown
th.bing.com
  • 2.18.29.161
unknown
fp.msedge.net
  • 204.79.197.222
unknown

Threats

No threats detected
No debug info