File name:

Spongebob#####.exe

Full analysis: https://app.any.run/tasks/277e0014-d0d8-498a-8061-1a858760f89e
Verdict: Malicious activity
Analysis date: November 09, 2024, 14:07:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

FF4A17C39D21C1142B374BB10958EB26

SHA1:

16FFA640CDC8C5D379D3D0F1EA99B8AE3F37013E

SHA256:

2D6A69E59A296086964F4F1B54A6EC0F63C804754839996735F0DCE4CDD853F2

SSDEEP:

49152:Rti/NQprhknubdpvBZNLs67pOCAayKQydrZebinz9KMxjfjzgdFHPNL:S/6prh7fBZN4AICvyKnubinzthfjzgXl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE to view/add/change user profiles

      • net.exe (PID: 1468)
      • cmd.exe (PID: 1368)
    • Disables Windows Defender

      • reg.exe (PID: 3436)
    • UAC/LUA settings modification

      • reg.exe (PID: 3492)
    • Create files in the Startup directory

      • cmd.exe (PID: 1368)
  • SUSPICIOUS

    • Executing commands from ".cmd" file

      • Spongebob#####.exe (PID: 3684)
    • Executable content was dropped or overwritten

      • Spongebob#####.exe (PID: 3684)
      • cmd.exe (PID: 1368)
    • Reads security settings of Internet Explorer

      • sapisvr.exe (PID: 1008)
      • sapisvr.exe (PID: 3012)
    • Starts CMD.EXE for commands execution

      • Spongebob#####.exe (PID: 3684)
    • Reads the Internet Settings

      • sapisvr.exe (PID: 1008)
      • sapisvr.exe (PID: 3012)
      • sipnotify.exe (PID: 292)
    • Creates file in the systems drive root

      • cmd.exe (PID: 1368)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1368)
    • Changes the desktop background image

      • reg.exe (PID: 4024)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 1368)
    • The process executes via Task Scheduler

      • sipnotify.exe (PID: 292)
      • ctfmon.exe (PID: 1628)
    • The system shut down or reboot

      • cmd.exe (PID: 1368)
    • Reads settings of System Certificates

      • sipnotify.exe (PID: 292)
    • Likely accesses (executes) a file from the Public directory

      • wscript.exe (PID: 2940)
      • wscript.exe (PID: 2604)
      • wscript.exe (PID: 3160)
      • wscript.exe (PID: 3188)
  • INFO

    • Create files in a temporary directory

      • Spongebob#####.exe (PID: 3684)
    • Checks supported languages

      • Spongebob#####.exe (PID: 3684)
      • sapisvr.exe (PID: 1008)
      • sapisvr.exe (PID: 3012)
      • IMEKLMG.EXE (PID: 2124)
      • IMEKLMG.EXE (PID: 2132)
      • MainWindow.exe (PID: 2172)
      • wmpnscfg.exe (PID: 2560)
      • wmpnscfg.exe (PID: 2584)
    • UPX packer has been detected

      • Spongebob#####.exe (PID: 3684)
    • Manual execution by a user

      • sapisvr.exe (PID: 1008)
      • sapisvr.exe (PID: 2828)
      • sapisvr.exe (PID: 3408)
      • sapisvr.exe (PID: 3012)
      • osk.exe (PID: 2400)
      • osk.exe (PID: 3868)
      • IMEKLMG.EXE (PID: 2124)
      • MainWindow.exe (PID: 2172)
      • wscript.exe (PID: 2152)
      • osk.exe (PID: 2184)
      • wmpnscfg.exe (PID: 2560)
      • wmpnscfg.exe (PID: 2584)
      • IMEKLMG.EXE (PID: 2132)
      • wscript.exe (PID: 2604)
      • wscript.exe (PID: 2940)
      • wscript.exe (PID: 3160)
      • wscript.exe (PID: 3188)
    • Creates files or folders in the user directory

      • sapisvr.exe (PID: 1008)
    • Reads the computer name

      • sapisvr.exe (PID: 1008)
      • sapisvr.exe (PID: 3012)
      • IMEKLMG.EXE (PID: 2132)
      • wmpnscfg.exe (PID: 2560)
      • IMEKLMG.EXE (PID: 2124)
      • wmpnscfg.exe (PID: 2584)
    • The process uses the downloaded file

      • sapisvr.exe (PID: 1008)
      • sapisvr.exe (PID: 3012)
    • Reads the time zone

      • net1.exe (PID: 1796)
    • Creates files in the program directory

      • cmd.exe (PID: 1368)
    • Process checks whether UAC notifications are on

      • IMEKLMG.EXE (PID: 2124)
      • IMEKLMG.EXE (PID: 2132)
    • Reads security settings of Internet Explorer

      • sipnotify.exe (PID: 292)
    • Reads the software policy settings

      • sipnotify.exe (PID: 292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:08 13:12:00+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 2199552
InitializedDataSize: 221184
UninitializedDataSize: 1503232
EntryPoint: 0x388370
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
FileVersionNumber: 3.6.6.6
ProductVersionNumber: 3.6.6.6
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: HorrorTrojan
FileDescription: SPONGEBOB WAS HERE!!!
FileVersion: 3,6,6,6
ProductName: SpongebobF*ck
InternalName: SPONGEBOB IS WATCHING YOU!!!
ProductVersion: 3,6,6,6
LegalCopyright: 2022
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
33
Malicious processes
3
Suspicious processes
3

Behavior graph

Click at the process to see the details
start THREAT spongebob#####.exe cmd.exe sapisvr.exe no specs sapisvr.exe speechuxwiz.exe no specs sapisvr.exe no specs sapisvr.exe speechuxwiz.exe no specs osk.exe no specs osk.exe reg.exe no specs rundll32.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs net.exe no specs net1.exe no specs shutdown.exe no specs ctfmon.exe no specs sipnotify.exe imeklmg.exe no specs imeklmg.exe no specs wscript.exe no specs mainwindow.exe no specs osk.exe no specs wmpnscfg.exe no specs wmpnscfg.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs wscript.exe no specs spongebob#####.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
292C:\Windows\system32\sipnotify.exe -LogonOrUnlockC:\Windows\System32\sipnotify.exe
taskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
sipnotify
Exit code:
0
Version:
6.1.7602.20480 (win7sp1_ldr_escrow.191010-1716)
Modules
Images
c:\windows\system32\sipnotify.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
980"C:\Windows\system32\Speech\SpeechUX\SpeechUXWiz.exe" UserEnrollment,en-US,HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech\RecoProfiles\Tokens\{1C89B5D5-512A-45FE-8726-F63999D05769},65552,0,""C:\Windows\System32\Speech\SpeechUX\SpeechUXWiz.exesapisvr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Speech UX Configuration
Exit code:
3221225547
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\speech\speechux\speechuxwiz.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1008"C:\Windows\Speech\Common\sapisvr.exe" -SpeechUXC:\Windows\Speech\Common\sapisvr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Speech Recognition
Exit code:
3221225547
Version:
5.3.11513.00 (win7_rtm.090713-1255)
Modules
Images
c:\windows\speech\common\sapisvr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
1368C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\C389.tmp\SpongebobFuck.cmd""C:\Windows\System32\cmd.exe
Spongebob#####.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1468net user admin /fullname:"SPONGEBOB WAS HERE!!!"C:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
1628C:\Windows\System32\ctfmon.exe C:\Windows\System32\ctfmon.exetaskeng.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CTF Loader
Exit code:
1073807364
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ctfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msctfmonitor.dll
c:\windows\system32\msctf.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
1796C:\Windows\system32\net1 user admin /fullname:"SPONGEBOB WAS HERE!!!"C:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
2060"C:\Windows\system32\Speech\SpeechUX\SpeechUXWiz.exe" UserEnrollment,en-US,HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech\RecoProfiles\Tokens\{1C89B5D5-512A-45FE-8726-F63999D05769},65552,0,""C:\Windows\System32\Speech\SpeechUX\SpeechUXWiz.exesapisvr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Speech UX Configuration
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\speech\speechux\speechuxwiz.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2124"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /JPN /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
2132"C:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXE" /SetPreload /KOR /LogC:\Program Files\Common Files\microsoft shared\IME14\SHARED\IMEKLMG.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office IME 2010
Exit code:
1
Version:
14.0.4734.1000
Modules
Images
c:\program files\common files\microsoft shared\ime14\shared\imeklmg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\userenv.dll
Total events
10 125
Read events
9 568
Write events
556
Delete events
1

Modification events

(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\Recognizers
Operation:writeName:DefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech\Recognizers\Tokens\MS-1033-80-DESK
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\Recognizers\LanguageDefaults
Operation:writeName:409
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech\Recognizers\Tokens\MS-1033-80-DESK
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\CurrentUserLexicon
Operation:writeName:CLSID
Value:
{C9E37C15-DF92-4727-85D6-72E5EEB6995A}
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\CurrentUserLexicon\{C9E37C15-DF92-4727-85D6-72E5EEB6995A}\Files
Operation:writeName:Datafile
Value:
%1a%\Microsoft\Speech\Files\UserLexicons\SP_F66E5290272047C7990D4484C4517E39.dat
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\CurrentUserLexicon
Operation:writeName:Generation
Value:
0
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\CurrentUserShortcut
Operation:writeName:CLSID
Value:
{C9E37C15-DF92-4727-85D6-72E5EEB6995A}
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\CurrentUserShortcut\{C9E37C15-DF92-4727-85D6-72E5EEB6995A}\Files
Operation:writeName:Datafile
Value:
%1a%\Microsoft\Speech\Files\UserShortcuts\SP_9660E07A03BA4DAE9A79BD191DB6E014.dat
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\AudioInput\TokenEnums\MMAudioIn\{0.0.1.00000000}.{cd6427a6-e7dd-4b3e-8516-c9fd3e17e7b1}
Operation:writeName:CLSID
Value:
{CF3D2E50-53F2-11D2-960C-00C04F8EE628}
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\AudioInput\TokenEnums\MMAudioIn\{0.0.1.00000000}.{cd6427a6-e7dd-4b3e-8516-c9fd3e17e7b1}
Operation:writeName:DeviceName
Value:
Line In (Realtek AC'97 Audio)
(PID) Process:(1008) sapisvr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Speech\AudioInput\TokenEnums\MMAudioIn\{0.0.1.00000000}.{cd6427a6-e7dd-4b3e-8516-c9fd3e17e7b1}
Operation:writeName:DeviceId
Value:
{0.0.1.00000000}.{cd6427a6-e7dd-4b3e-8516-c9fd3e17e7b1}
Executable files
4
Suspicious files
3
Text files
110
Unknown types
0

Dropped files

PID
Process
Filename
Type
3684Spongebob#####.exeC:\Users\admin\AppData\Local\Temp\C389.tmp\MainWindow.exeexecutable
MD5:03D8B31DB1ED1294334B872F756AD1A1
SHA256:7E17DCAAFC07877E720B3FC0E666AC69E2DCE8E7458AE9B23902BCF5F8F2A40A
3684Spongebob#####.exeC:\Users\admin\AppData\Local\Temp\C389.tmp\mover.exeexecutable
MD5:C1978E4080D1EC7E2EDF49D6C9710045
SHA256:C9E2A7905501745C304FFC5A70B290DB40088D9DC10C47A98A953267468284A8
3684Spongebob#####.exeC:\Users\admin\AppData\Local\Temp\C389.tmp\bg.bmpimage
MD5:CE45A70D3CC2941A147C09264FC1CDA5
SHA256:ECEEDADFDE8506A73650CFA9A936E6A8FFF7FFB664C9602BB14432AA2F8109AC
3684Spongebob#####.exeC:\Users\admin\AppData\Local\Temp\C389.tmp\bobspeak.vbstext
MD5:8884A25E47D799F6BD3D4EC20F05A3B7
SHA256:5A68437EDD63BD826A1F1557121D4C05114C608FD8A18A0C9C156A60D90BD0C1
3684Spongebob#####.exeC:\Users\admin\AppData\Local\Temp\C389.tmp\SpongebobFuck.cmdtext
MD5:7A918ED93F7FB297E05464EDCCC46756
SHA256:82FCB47B437DC1BEDB77648755770B7CD9A29342FD2AB972C8BD063968D04604
1368cmd.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\MainWindow.exeexecutable
MD5:03D8B31DB1ED1294334B872F756AD1A1
SHA256:7E17DCAAFC07877E720B3FC0E666AC69E2DCE8E7458AE9B23902BCF5F8F2A40A
1368cmd.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\bobspeak.vbstext
MD5:8884A25E47D799F6BD3D4EC20F05A3B7
SHA256:5A68437EDD63BD826A1F1557121D4C05114C608FD8A18A0C9C156A60D90BD0C1
1368cmd.exeC:\Users\Public\Desktop\NOESCAPE20480.vbstext
MD5:7C0B3EF9968D114404D5CB1EF66EAE49
SHA256:B765F9B09B6C3D040C96E9B09ECA1ED1A8BC3F980BA09BEABC0A8DF726181BBF
1368cmd.exeC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\mover.exeexecutable
MD5:C1978E4080D1EC7E2EDF49D6C9710045
SHA256:C9E2A7905501745C304FFC5A70B290DB40088D9DC10C47A98A953267468284A8
1008sapisvr.exeC:\Users\admin\AppData\Roaming\Microsoft\Speech\Files\UserShortcuts\SP_9660E07A03BA4DAE9A79BD191DB6E014.datbinary
MD5:4A6280D45912861186230E2F13373167
SHA256:674C13FEBCE4E5FA8E136905B5CD8113B01B3B81704EC550101CE57FBDD5C423
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
15
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
292
sipnotify.exe
HEAD
200
23.207.104.5:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133756349793120000
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
239.255.255.250:3702
whitelisted
1100
svchost.exe
224.0.0.252:5355
whitelisted
1460
svchost.exe
239.255.255.250:3702
whitelisted
292
sipnotify.exe
23.207.104.5:80
query.prod.cms.rt.microsoft.com
AKAMAI-AS
JP
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
query.prod.cms.rt.microsoft.com
  • 23.207.104.5
whitelisted

Threats

No threats detected
No debug info