File name:

evtrpt102a.exe

Full analysis: https://app.any.run/tasks/c12cfe82-b92f-421f-a1fa-3e52c47252e3
Verdict: Malicious activity
Analysis date: May 22, 2025, 02:20:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

85327802A11182985378229509D20274

SHA1:

9FD09DDAB34463FD330F0B70CB7C828C35F9E254

SHA256:

2E5901226686EDD9B679ED8A5424071B8B6505DFAB5B0F7A5799D15A41ABEA89

SSDEEP:

196608:OoiCooxJdPF2ehpHG5l7Gu8jH/pYIzUQvBdCWd:O7CoE2eoQzjHtIQvBp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • evtrpt102a.exe (PID: 6656)
      • evtrpt102a.exe (PID: 5508)
      • ISBEW64.exe (PID: 5596)
      • ISBEW64.exe (PID: 6816)
      • CFGEvntSLog.exe (PID: 1764)
  • SUSPICIOUS

    • Adds/modifies Windows certificates

      • msiexec.exe (PID: 5164)
    • There is functionality for taking screenshot (YARA)

      • evtrpt102a.exe (PID: 5508)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5984)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6668)
      • msiexec.exe (PID: 664)
      • TiWorker.exe (PID: 4164)
    • Executable content was dropped or overwritten

      • TiWorker.exe (PID: 4164)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 664)
      • TiWorker.exe (PID: 4164)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 6208)
  • INFO

    • The sample compiled with english language support

      • evtrpt102a.exe (PID: 5508)
      • msiexec.exe (PID: 5164)
      • msiexec.exe (PID: 664)
      • TiWorker.exe (PID: 4164)
      • msiexec.exe (PID: 6668)
    • Creates files in the program directory

      • evtrpt102a.exe (PID: 5508)
    • Reads the software policy settings

      • msiexec.exe (PID: 5164)
    • Checks supported languages

      • evtrpt102a.exe (PID: 5508)
      • msiexec.exe (PID: 664)
      • msiexec.exe (PID: 1672)
    • Reads the computer name

      • evtrpt102a.exe (PID: 5508)
      • msiexec.exe (PID: 664)
      • msiexec.exe (PID: 1672)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 5164)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 5164)
    • Checks proxy server information

      • msiexec.exe (PID: 5164)
    • Create files in a temporary directory

      • evtrpt102a.exe (PID: 5508)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5164)
      • msiexec.exe (PID: 664)
      • msiexec.exe (PID: 6668)
    • Manages system restore points

      • SrTasks.exe (PID: 2268)
    • The sample compiled with german language support

      • msiexec.exe (PID: 664)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (38.7)
.exe | Win64 Executable (generic) (34.3)
.scr | Windows screen saver (16.2)
.exe | Win32 Executable (generic) (5.6)
.exe | Generic Win/DOS Executable (2.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2008:09:11 05:55:59+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 425984
InitializedDataSize: 200704
UninitializedDataSize: -
EntryPoint: 0x36327
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 15.0.0.591
ProductVersionNumber: 15.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Adiscon GmbH
FileDescription: Setup Launcher
FileVersion: 10.2.0.322
InternalName: Setup
LegalCopyright: Copyright (C) 2008 Acresso Software Inc. and/or InstallShield Co. Inc. All Rights Reserved.
OriginalFileName: Setup.exe
ProductName: EventReporter 10.2a - Build 322
ProductVersion: 10.2.0.322
InternalBuildNumber: 82160
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
21
Malicious processes
3
Suspicious processes
6

Behavior graph

Click at the process to see the details
start evtrpt102a.exe sppextcomobj.exe no specs slui.exe no specs msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe isbew64.exe no specs msi690f.tmp no specs conhost.exe no specs msiexec.exe no specs wac6187.tmp no specs msiexec.exe no specs wac6187.tmp no specs tiworker.exe isbew64.exe no specs cfgevntslog.exe no specs evtrpt102a.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
664C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
960C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1672C:\Windows\syswow64\MsiExec.exe -Embedding B0ADF813D5DC083BADCFC79E205EB181 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1764"C:\Program Files (x86)\EventReporter\CFGEvntSLog.exe"C:\Program Files (x86)\EventReporter\CFGEvntSLog.exemsiexec.exe
User:
admin
Company:
Adiscon GmbH
Integrity Level:
HIGH
Version:
10.02.0360
Modules
Images
c:\program files (x86)\eventreporter\cfgevntslog.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
2108\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2268C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4164C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
4408"C:\WINDOWS\Installer\MSI690F.tmp"C:\Windows\Installer\MSI690F.tmpmsiexec.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\installer\msi690f.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4452C:\Windows\syswow64\MsiExec.exe -Embedding 862E50492CB51CA3BE20D69DA22240BB M Global\MSI0000C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5164MSIEXEC.EXE /i "C:\ProgramData\{88336AD7-C2F3-422A-8282-A62841F86EC1}\EventReporter.msi" SETUPEXEDIR="C:\Users\admin\AppData\Local\Temp" SETUPEXENAME="evtrpt102a.exe"C:\Windows\SysWOW64\msiexec.exe
evtrpt102a.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
19 867
Read events
18 873
Write events
921
Delete events
73

Modification events

(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:627F8D7827656399D27D7F9044C9FEB3F33EFA9A
Value:
(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\627F8D7827656399D27D7F9044C9FEB3F33EFA9A
Operation:writeName:Blob
Value:
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
(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\627F8D7827656399D27D7F9044C9FEB3F33EFA9A
Operation:writeName:Blob
Value:
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
(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Volatile\00\MACHINE\SOFTWARE\Classes\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(5164) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Volatile\00\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(664) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000C162B32DC0CADB019802000070190000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(664) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000C162B32DC0CADB019802000070190000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(664) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000E7C6B52DC0CADB019802000070190000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
Executable files
78
Suspicious files
58
Text files
45
Unknown types
2

Dropped files

PID
Process
Filename
Type
5508evtrpt102a.exeC:\Users\admin\AppData\Local\Temp\_isB607.tmp
MD5:
SHA256:
5508evtrpt102a.exeC:\Users\admin\AppData\Local\Temp\{7B04A177-45DE-4B96-8425-FD1BB93F9D39}\EventReporter.msi
MD5:
SHA256:
5508evtrpt102a.exeC:\ProgramData\{88336AD7-C2F3-422A-8282-A62841F86EC1}\EventReporter.msi
MD5:
SHA256:
5508evtrpt102a.exeC:\Users\admin\AppData\Local\Temp\{7B04A177-45DE-4B96-8425-FD1BB93F9D39}\_ISMSIDEL.INItext
MD5:BC8BD1A103DAA0BAEE81C925423D7CF6
SHA256:4F645E15999F63F80DBD08B972C7C304CA279A77AD4F3E866E9C75AA1D193ACB
664msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
664msiexec.exeC:\Windows\Installer\115d5f.msi
MD5:
SHA256:
5508evtrpt102a.exeC:\Users\admin\AppData\Local\Temp\{7B04A177-45DE-4B96-8425-FD1BB93F9D39}\0x0409.initext
MD5:758747727E96A23C7C5A5BBB011656E4
SHA256:BAD3B2E854149DF9413F06E6C1C7B7C875545393877F59B59907F6B083CE5825
5164msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\486CC6AFD08942336C61FCD401C4A1D1binary
MD5:0CE9C3D155E99DADCDC82FBFB21E7D9B
SHA256:031AE20AF4F299D5E98D981333BE7D8B32A56B47765E194E816A918BE43622DA
5508evtrpt102a.exeC:\Users\admin\AppData\Local\Temp\~BFAD.tmptext
MD5:509580F0C2D7D94EC5029288E13040E3
SHA256:B6FC07FF3474A0B7702273CF8BD3234C71177C5A69B91855220EB24F5C975BFE
5164msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E7B158B31D45761A93C56C441E33DD68_3FA774250FA4F1C428F53982E306C9ACbinary
MD5:5BFA51F3A417B98E7443ECA90FC94703
SHA256:BEBE2853A3485D1C2E5C5BE4249183E0DDAFF9F87DE71652371700A89D937128
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
31
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
664
msiexec.exe
GET
200
2.23.79.3:80
http://crl.thawte.com/ThawtePremiumServerCA.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5164
msiexec.exe
GET
200
2.17.189.192:80
http://crl.thawte.com/ThawtePremiumServerCA.crl
unknown
whitelisted
5164
msiexec.exe
GET
200
2.17.189.192:80
http://crl.thawte.com/ThawtePremiumServerCA.crl
unknown
whitelisted
5164
msiexec.exe
GET
200
2.17.189.192:80
http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSDXMN22sHhCJ%2BQ8WDKToovi3RuCgQUxe2TXys4R35Y01fH%2F0XFREHhX78CEAmyW%2FFVaSfmAYR%2FLp8SFGQ%3D
unknown
whitelisted
5164
msiexec.exe
GET
200
2.17.189.192:80
http://ocsp.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSDXMN22sHhCJ%2BQ8WDKToovi3RuCgQUxe2TXys4R35Y01fH%2F0XFREHhX78CEAmyW%2FFVaSfmAYR%2FLp8SFGQ%3D
unknown
whitelisted
5164
msiexec.exe
GET
200
2.17.189.192:80
http://crl.thawte.com/ThawteCodeSigningCA.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
crl.thawte.com
  • 2.17.189.192
  • 2.23.79.3
whitelisted
ocsp.thawte.com
  • 2.17.189.192
whitelisted
login.live.com
  • 40.126.31.131
  • 20.190.159.0
  • 20.190.159.128
  • 20.190.159.75
  • 20.190.159.129
  • 40.126.31.129
  • 40.126.31.0
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

No threats detected
No debug info