File name:

46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339

Full analysis: https://app.any.run/tasks/b4f2ff2c-6b05-425d-b68a-5e37bff13a00
Verdict: Malicious activity
Analysis date: September 03, 2025, 17:08:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

12DE70D06ED65680914D061347AC1F95

SHA1:

14023E1ED46236CBFB463DDCCD6345CAA3C14D54

SHA256:

46B90CCE656EFE63BC33B585581C2CAFD25778F2854A334F0421D219ED17B339

SSDEEP:

768:ig6GjbEXWJ9OkC35ha2H9mmhmcllFBM8GS179/sHCSrm1yVniI2RtPZEMuBMVB+Y:izGjb92pgcHvM5HGZEMGMpwE8FQL04u6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
    • Executes application which crashes

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • The process executes via Task Scheduler

      • Accounts_Ledger_Software.eXE (PID: 3888)
  • INFO

    • Checks supported languages

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • Reads the computer name

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • Creates files or folders in the user directory

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • WerFault.exe (PID: 4100)
      • WerFault.exe (PID: 5708)
    • Reads Environment values

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • Reads the machine GUID from the registry

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • Launching a file from Task Scheduler

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • Disables trace logs

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • Accounts_Ledger_Software.eXE (PID: 3888)
    • Checks proxy server information

      • 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe (PID: 5020)
      • WerFault.exe (PID: 4100)
      • Accounts_Ledger_Software.eXE (PID: 3888)
      • WerFault.exe (PID: 5708)
    • Reads the software policy settings

      • WerFault.exe (PID: 4100)
      • WerFault.exe (PID: 5708)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2063:03:23 15:55:17+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 8
CodeSize: 9728
InitializedDataSize: 70656
UninitializedDataSize: -
EntryPoint: 0x445e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.5.2.1
ProductVersionNumber: 3.5.2.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Accounts_Informtive_Analysis_Tool
CompanyName: capital services private limited
FileDescription: Accounts_Informtive_Analysis_Tool
FileVersion: 3.5.2.1
InternalName: Accounts_Informtive_Analysis_Tool.exe
LegalCopyright: Copyrights Accounts_Informtive_Analysis_Tool@2024
LegalTrademarks: -
OriginalFileName: Accounts_Informtive_Analysis_Tool.exe
ProductName: Accounts_Informtive_Analysis_Tool
ProductVersion: 3.5.2.1
AssemblyVersion: 3.5.2.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
9
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe schtasks.exe no specs conhost.exe no specs werfault.exe accounts_ledger_software.exe schtasks.exe no specs conhost.exe no specs slui.exe no specs werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
2192\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2220C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3888"C:\Users\admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE"C:\Users\admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE
svchost.exe
User:
admin
Company:
capital services private limited
Integrity Level:
MEDIUM
Description:
Accounts_Informtive_Analysis_Tool
Exit code:
3762504530
Version:
3.5.2.1
Modules
Images
c:\users\admin\appdata\roaming\microsoftwindowsupdates\accounts_ledger_software.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4100C:\WINDOWS\system32\WerFault.exe -u -p 5020 -s 1652C:\Windows\System32\WerFault.exe
46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
4580"SCHtAsKs.EXe" /create /tn WindowsUpdates /TR 'C:\Users\admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE' /du 9999:59 /sc daily /ri 1C:\Windows\System32\schtasks.exeAccounts_Ledger_Software.eXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5020"C:\Users\admin\AppData\Local\Temp\46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe" C:\Users\admin\AppData\Local\Temp\46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe
explorer.exe
User:
admin
Company:
capital services private limited
Integrity Level:
MEDIUM
Description:
Accounts_Informtive_Analysis_Tool
Exit code:
3762504530
Version:
3.5.2.1
Modules
Images
c:\users\admin\appdata\local\temp\46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5708C:\WINDOWS\system32\WerFault.exe -u -p 3888 -s 1612C:\Windows\System32\WerFault.exe
Accounts_Ledger_Software.eXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
5764"SCHtAsKs.EXe" /create /tn WindowsUpdates /TR 'C:\Users\admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXE' /du 9999:59 /sc daily /ri 1C:\Windows\System32\schtasks.exe46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
8 313
Read events
8 285
Write events
28
Delete events
0

Modification events

(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5020) 46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
6
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
4100WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_F4C02ZJ2RUD1TX02_85753654635d61137f65b3b6f124cdd46b3d8d4_a5ea5926_6f263a21-125d-4dec-b556-2509711f7de2\Report.wer
MD5:
SHA256:
4100WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe.5020.dmp
MD5:
SHA256:
5708WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Accounts_Ledger__54935eda5698c59d73a32611886179275777dcf2_ac520aa0_4f5c8717-8fef-4e77-8123-72fc95ec2940\Report.wer
MD5:
SHA256:
5708WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Accounts_Ledger_Software.eXE.3888.dmp
MD5:
SHA256:
4100WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1CA6.tmp.dmpbinary
MD5:FEB5E4C44B2BC8647D948F0463DDA382
SHA256:45C87273FD8AD9A4920A1EED457889B7ACF2FAB4B76E2AB33D81A1B9C837A70B
4100WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:28563F5859898C2672CCF7761F4BA8C6
SHA256:0DB6A47FDA99E11081A04CEDE6DB6A54B8CCCC3D359CCB74C11CB6AD34BF9234
4100WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1D72.tmp.WERInternalMetadata.xmlxml
MD5:4F9E17F53930904F5CF305D8CB56C049
SHA256:7D2FC2A2B40B9D414236C8EE0A0E513B58B406C3342C95CB90701AE2FDB03358
502046b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exeC:\Users\admin\AppData\Roaming\MicrosoftwindowsUpdates\Accounts_Ledger_Software.eXEexecutable
MD5:12DE70D06ED65680914D061347AC1F95
SHA256:46B90CCE656EFE63BC33B585581C2CAFD25778F2854A334F0421D219ED17B339
4100WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1D92.tmp.xmlxml
MD5:BE30161E656BF9206C215182764CE0D0
SHA256:708922F948C49B3E5398D6A207779EC6AE3A09580B95A8D2A2014BF07E92B395
4100WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:D310523737A0D4D05066857AC157F458
SHA256:0A0520D498306689AFA3CAC09ACE82E09229108FC9FABA5A906291D077004484
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
26
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4528
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6796
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6796
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4100
WerFault.exe
GET
200
2.16.164.73:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4100
WerFault.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7032
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5020
46b90cce656efe63bc33b585581c2cafd25778f2854a334f0421d219ed17b339.exe
77.221.151.42:80
OOO National Telecommunications
RU
unknown
4
System
192.168.100.255:138
whitelisted
4528
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4528
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 216.58.206.46
whitelisted
login.live.com
  • 20.190.160.130
  • 40.126.32.138
  • 20.190.160.64
  • 20.190.160.128
  • 20.190.160.14
  • 20.190.160.65
  • 20.190.160.22
  • 20.190.160.20
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
  • 2.16.164.73
  • 2.16.164.66
  • 2.16.164.33
  • 2.16.164.83
  • 2.16.164.98
  • 2.16.164.58
  • 2.16.164.107
  • 2.16.164.74
  • 2.16.164.34
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 135.232.92.137
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
watson.events.data.microsoft.com
  • 135.234.160.246
whitelisted
self.events.data.microsoft.com
  • 13.89.178.26
whitelisted

Threats

No threats detected
No debug info