File name:

Adblock360Installer.exe

Full analysis: https://app.any.run/tasks/a006d383-fc5d-4d18-8f15-84d0f32dec24
Verdict: Malicious activity
Analysis date: June 09, 2025, 10:14:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
golang
advancedinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 14 sections
MD5:

8EE371D19B491429DABC3E70499A8676

SHA1:

F3F75924E96F31A30D42FA8840EA8B095DA48D51

SHA256:

42BD0DA29E48491CA6FCB90C7371ACDA83FA9EB0DE6D2BC3BCA6493803638662

SSDEEP:

98304:qnxm0+wnTgJEnrZSSnVJFtcFHfsGGcqORi3uGNDO9kQYgoVMV5nY1sg77mKS86hQ:BYFzmcB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 1244)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5232)
      • powershell.exe (PID: 8064)
      • powershell.exe (PID: 6880)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Adblock360Installer.exe (PID: 7256)
    • Application launched itself

      • Adblock360Installer.exe (PID: 7256)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 1244)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 1244)
    • The process hide an interactive prompt from the user

      • msiexec.exe (PID: 1244)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 1244)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 7588)
      • msiexec.exe (PID: 7496)
  • INFO

    • Reads the computer name

      • Adblock360Installer.exe (PID: 7256)
      • Adblock360Installer.exe (PID: 7048)
      • msiexec.exe (PID: 7496)
      • msiexec.exe (PID: 5776)
      • msiexec.exe (PID: 1244)
    • Checks supported languages

      • Adblock360Installer.exe (PID: 7256)
      • Adblock360Installer.exe (PID: 7048)
      • msiexec.exe (PID: 5776)
      • msiexec.exe (PID: 7496)
      • msiexec.exe (PID: 1244)
    • The sample compiled with english language support

      • Adblock360Installer.exe (PID: 7256)
      • msiexec.exe (PID: 7496)
      • msiexec.exe (PID: 7588)
    • Process checks computer location settings

      • Adblock360Installer.exe (PID: 7256)
    • Reads the machine GUID from the registry

      • Adblock360Installer.exe (PID: 7048)
    • Reads the software policy settings

      • Adblock360Installer.exe (PID: 7048)
      • msiexec.exe (PID: 7588)
      • powershell.exe (PID: 5232)
      • powershell.exe (PID: 6880)
      • powershell.exe (PID: 8064)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • Adblock360Installer.exe (PID: 7048)
    • Create files in a temporary directory

      • msiexec.exe (PID: 7496)
      • Adblock360Installer.exe (PID: 7048)
      • msiexec.exe (PID: 7588)
      • msiexec.exe (PID: 1244)
      • powershell.exe (PID: 5232)
      • powershell.exe (PID: 6880)
      • powershell.exe (PID: 8064)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7496)
      • msiexec.exe (PID: 7588)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 7496)
      • msiexec.exe (PID: 7588)
    • Reads Environment values

      • msiexec.exe (PID: 7496)
      • msiexec.exe (PID: 1244)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 7588)
      • powershell.exe (PID: 5232)
      • powershell.exe (PID: 6880)
      • powershell.exe (PID: 8064)
    • Checks proxy server information

      • msiexec.exe (PID: 7588)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 5232)
      • powershell.exe (PID: 6880)
      • powershell.exe (PID: 8064)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 6880)
    • Application based on Golang

      • Adblock360Installer.exe (PID: 7048)
    • Detects GO elliptic curve encryption (YARA)

      • Adblock360Installer.exe (PID: 7048)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 3
CodeSize: 3017728
InitializedDataSize: 251392
UninitializedDataSize: -
EntryPoint: 0x72f40
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: ADBLOCK LIMITED
FileDescription: Adblock360 Downloader and Installer
FileVersion: 1.0.0.0
InternalName: -
LegalCopyright: Copyright (c) 2025 ADBLOCK LIMITED
LegalTrademarks: -
OriginalFileName: Adblock360Installer.exe
PrivateBuild: -
ProductName: Adblock360Installer
ProductVersion: 1.0.0.0
SpecialBuild: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
13
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start adblock360installer.exe no specs adblock360installer.exe msiexec.exe msiexec.exe no specs msiexec.exe msiexec.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1244C:\Windows\syswow64\MsiExec.exe -Embedding CEB0DC85CBA748E3A61AA58C1267CE5F CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4040C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5232 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Local\Temp\pssDA7.ps1" -propFile "C:\Users\admin\AppData\Local\Temp\msiDA4.txt" -scriptFile "C:\Users\admin\AppData\Local\Temp\scrDA5.ps1" -scriptArgsFile "C:\Users\admin\AppData\Local\Temp\scrDA6.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
5328\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5776C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6488\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6880 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Local\Temp\pss1984.ps1" -propFile "C:\Users\admin\AppData\Local\Temp\msi1972.txt" -scriptFile "C:\Users\admin\AppData\Local\Temp\scr1973.ps1" -scriptArgsFile "C:\Users\admin\AppData\Local\Temp\scr1974.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
7048"C:\Users\admin\AppData\Local\Temp\Adblock360Installer.exe" C:\Users\admin\AppData\Local\Temp\Adblock360Installer.exe
Adblock360Installer.exe
User:
admin
Company:
ADBLOCK LIMITED
Integrity Level:
HIGH
Description:
Adblock360 Downloader and Installer
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\adblock360installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
7256"C:\Users\admin\AppData\Local\Temp\Adblock360Installer.exe" C:\Users\admin\AppData\Local\Temp\Adblock360Installer.exeexplorer.exe
User:
admin
Company:
ADBLOCK LIMITED
Integrity Level:
MEDIUM
Description:
Adblock360 Downloader and Installer
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\adblock360installer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
7364\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
25 654
Read events
25 650
Write events
4
Delete events
0

Modification events

(PID) Process:(7588) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(7588) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(7588) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Volatile\00\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib
Operation:writeName:Version
Value:
1.1
(PID) Process:(7588) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Volatile\00\MACHINE\SOFTWARE\Classes\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib
Operation:writeName:Version
Value:
1.1
Executable files
13
Suspicious files
5
Text files
20
Unknown types
3

Dropped files

PID
Process
Filename
Type
7048Adblock360Installer.exeC:\Users\admin\AppData\Local\Temp\Adblock360-Setup_2.1.0.0053.msi
MD5:
SHA256:
1244msiexec.exeC:\Users\admin\AppData\Local\Temp\msiDA4.txt
MD5:
SHA256:
1244msiexec.exeC:\Users\admin\AppData\Local\Temp\scrDA5.ps1
MD5:
SHA256:
1244msiexec.exeC:\Users\admin\AppData\Local\Temp\scrDA6.txt
MD5:
SHA256:
1244msiexec.exeC:\Users\admin\AppData\Local\Temp\pssDA7.ps1
MD5:
SHA256:
7588msiexec.exeC:\Users\admin\AppData\Local\Temp\MSICFB.tmpexecutable
MD5:379F76E2FA6EEF4C2116C2A3AE6896BE
SHA256:C54F8A0CC280A9A0C934B8B23BBD530BA739E79AD686121CC8B659882CEB60FD
7588msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBder
MD5:3C145C98178911F1FB1D960B9DEDE0AA
SHA256:AB7181B3A9A9EFED436BB196CCF55E2329FDF4C67E0026EE76BB21D061AB6F6F
7496msiexec.exeC:\Users\admin\AppData\Local\AdvinstAnalytics\668fe6355a890781773f449f\2.1.0.0053\{BDD4A72B-0F5C-4FDA-9EF0-6AE8FFC31F52}.sessiontext
MD5:E1FC64D762D575EF2C1B943684E6EE62
SHA256:E2EFCCF7563890A9FF1A16CB12E3CEADA5907F1B37DA586CFA6C1CE9486D1555
7588msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:DBDE23AC7B99851DFE843D0F65330D84
SHA256:61D5A9ABB9C748C17628341A354FFB741854CA7755F79E961867F529F410140C
7496msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI11084\InstallerAnalytics.dllexecutable
MD5:5293D61DDB99767CAD4BC4E952517163
SHA256:B784371C1278E079AE201226079BECE93456F9D38DD733FC29F51E79CF4EA705
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
19
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7588
msiexec.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6208
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7588
msiexec.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
7588
msiexec.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAEldo4y1XhTxXnw4hY%2Bw5A%3D
unknown
whitelisted
6960
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6960
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
6208
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
3760
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7048
Adblock360Installer.exe
65.9.66.120:443
api.adblock360.com
AMAZON-02
US
unknown
7588
msiexec.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
api.adblock360.com
  • 65.9.66.120
  • 65.9.66.55
  • 65.9.66.73
  • 65.9.66.3
unknown
ocsp.digicert.com
  • 2.23.77.188
whitelisted
login.live.com
  • 20.190.160.4
  • 20.190.160.131
  • 20.190.160.64
  • 20.190.160.2
  • 20.190.160.132
  • 20.190.160.3
  • 40.126.32.74
  • 20.190.160.14
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info