File name:

28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86

Full analysis: https://app.any.run/tasks/d753cde1-f930-4479-be24-44795084f063
Verdict: Malicious activity
Threats:

Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions.

Analysis date: September 18, 2024, 23:44:56
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
upx
sality
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

E4A2A949469C1A1D850369C9851648C3

SHA1:

D21E6408627545A450C9F23C967382F942638D45

SHA256:

28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86

SSDEEP:

49152:fwvMThrOEWpxUc8RoHeGOhIfBOesKboRylTYpEdPMzs6G:4vIhrQHsoHlOOYpEdPCk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Application launched itself

      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6988)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6440)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6436)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6120)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 2424)
    • Executable content was dropped or overwritten

      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6120)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6440)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6436)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 2424)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6988)
  • INFO

    • UPX packer has been detected

      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6948)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6988)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6440)
      • 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe (PID: 6120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.scr | Windows screen saver (60.6)
.exe | Win32 Executable (generic) (20.8)
.exe | Generic Win/DOS Executable (9.2)
.exe | DOS Executable Generic (9.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2008:09:16 14:17:11+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5
CodeSize: 696320
InitializedDataSize: 335872
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.80.0.0
ProductVersionNumber: 3.80.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
ProductName: WinRAR
CompanyName: Alexander Roshal
FileDescription: WinRAR archiver
FileVersion: 3.8
InternalName: WinRAR
LegalCopyright: Copyright © Alexander Roshal 1993-2008
OriginalFileName: WinRAR.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
9
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start THREAT 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe THREAT 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe no specs 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe THREAT 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe THREAT 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe sppextcomobj.exe no specs slui.exe no specs 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2424"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6120"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6436"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6440"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6456"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6536C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6900"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6948"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6988"C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe" C:\Users\admin\Desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
10 978
Read events
9 585
Write events
1 393
Delete events
0

Modification events

(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:GlobalUserOffline
Value:
0
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:1768776801
Value:
145
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:-757413694
Value:
0
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:1011363107
Value:
0
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:-1514827388
Value:
35
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:253949413
Value:
390
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:2022726214
Value:
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
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp\-227342143
Operation:writeName:-503464281
Value:
8D482144D6AB9E65AB5D732E35BA327F2DCEC983D41A37D56DAFF40919CA9630CDF6902C1C5EAEE675386957562866F4069CED404BFAB7C8B60A4167F6A7847BEF830A6F30C03ADD6EA841B65CA653F5F5B7C53F251A450424A27E7AC478835F982AE213A3634E32F62DF34219E6C9D7744EEF2F97FD353F0C698D9D20F10EC0
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp
Operation:writeName:a1_0
Value:
(PID) Process:(6988) 28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeKey:HKEY_CURRENT_USER\SOFTWARE\Aaspp
Operation:writeName:a2_0
Value:
9832
Executable files
8
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
612028232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\00203740_Rar\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeexecutable
MD5:E4A2A949469C1A1D850369C9851648C3
SHA256:28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86
698828232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\001FC9A2_Rar\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeexecutable
MD5:E4A2A949469C1A1D850369C9851648C3
SHA256:28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86
698828232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\00201C46_Rar\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeexecutable
MD5:E4A2A949469C1A1D850369C9851648C3
SHA256:28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86
643628232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\002025AC_Rar\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeexecutable
MD5:E4A2A949469C1A1D850369C9851648C3
SHA256:28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86
644028232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\00202EB5_Rar\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeexecutable
MD5:E4A2A949469C1A1D850369C9851648C3
SHA256:28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86
242428232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\0020575B_Rar\28232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeexecutable
MD5:E4A2A949469C1A1D850369C9851648C3
SHA256:28232AC6225952045BF9E92234E78B149952BFFEB39D9A0E3C10273DE0341B86
698828232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Microsoft\OneDrive\OneDrive.exeexecutable
MD5:CF1A1B2A6F227D5B06AB0B3C8B88618B
SHA256:1FD250A499B2912B1ACEC31A03CAA32F1B328F2861E1383E94F23386F724FB36
698828232ac6225952045bf9e92234e78b149952bffeb39d9a0e3c10273de0341b86.exeC:\Users\admin\AppData\Local\Temp\winokqw.exeexecutable
MD5:25AA9BB549ECC7BB6100F8D179452508
SHA256:DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
43
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2532
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7072
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6696
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6696
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2532
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2264
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.23.209.130:443
Akamai International B.V.
GB
unknown
52.182.141.63:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
2532
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2532
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 20.73.194.208
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
browser.pipe.aria.microsoft.com
  • 52.182.143.214
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
th.bing.com
  • 104.126.37.139
  • 104.126.37.145
  • 104.126.37.131
whitelisted
r.bing.com
  • 104.126.37.139
  • 104.126.37.131
  • 104.126.37.145
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.131
  • 104.126.37.145
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.68
  • 40.126.31.71
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.64
  • 20.190.159.4
whitelisted

Threats

No threats detected
No debug info