File name:

2b14373794ba0f8e1bb5e5986d4275503f16b1d2

Full analysis: https://app.any.run/tasks/649699e1-a693-43e7-b8fb-f267359e537d
Verdict: Malicious activity
Analysis date: September 20, 2024, 05:43:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

E9CFF4595BE329DA0B636AF02CF6DFE0

SHA1:

2B14373794BA0F8E1BB5E5986D4275503F16B1D2

SHA256:

62C1DC9A1A8986B0779DD893CFFBF2778D21E1BA3E2CB4788A031C08F49E349B

SSDEEP:

98304:6zD9AR8yMaSqvi/5Mo4j2vw8DS6g/Zc/3CbW4P2cns7tJs3f7/6+OZcE9jHGA40P:xRWKEESglPg2E

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
    • Executable content was dropped or overwritten

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
    • Reads security settings of Internet Explorer

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
      • LMIGuardianSvc.exe (PID: 6388)
    • Executing commands from ".cmd" file

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
    • Starts CMD.EXE for commands execution

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6972)
      • cmd.exe (PID: 6284)
      • cmd.exe (PID: 864)
    • Checks Windows Trust Settings

      • LMIGuardianSvc.exe (PID: 6388)
      • LMIIgnition.exe (PID: 1184)
  • INFO

    • Checks supported languages

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
      • LMIGuardianSvc.exe (PID: 6388)
    • Reads the computer name

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
      • LMIGuardianSvc.exe (PID: 6388)
    • Create files in a temporary directory

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
    • Process checks computer location settings

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
    • The process uses the downloaded file

      • 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe (PID: 6580)
      • LMIIgnition.exe (PID: 1184)
    • Reads the machine GUID from the registry

      • LMIGuardianSvc.exe (PID: 6388)
      • LMIIgnition.exe (PID: 1184)
    • Reads the software policy settings

      • LMIGuardianSvc.exe (PID: 6388)
      • LMIIgnition.exe (PID: 1184)
    • Checks proxy server information

      • LMIGuardianSvc.exe (PID: 6388)
      • LMIIgnition.exe (PID: 1184)
    • Creates files or folders in the user directory

      • LMIIgnition.exe (PID: 1184)
      • LMIGuardianSvc.exe (PID: 6388)
    • Creates files in the program directory

      • LMIGuardianSvc.exe (PID: 6388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:02:15 11:05:40+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.28
CodeSize: 73728
InitializedDataSize: 7453696
UninitializedDataSize: -
EntryPoint: 0x41b9
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.3.0.5538
ProductVersionNumber: 1.3.0.5538
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: LogMeIn, Inc.
FileDescription: LogMeIn Client Application
FileVersion: 1.3.5538
InternalName: LogMeIn Client
OriginalFileName: LogMeIn Client.exe
LegalCopyright: Copyright © 2006-2024 LogMeIn, Inc. All rights reserved.
ProductName: LogMeIn Client
ProductVersion: 1.3.5538
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
15
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe lmiignition.exe cmd.exe no specs conhost.exe no specs ping.exe no specs lmiguardiansvc.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs ping.exe no specs sppextcomobj.exe no specs slui.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
752"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
864C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\IgnB64A.tmp.cmd" "C:\Windows\SysWOW64\cmd.exeLMIIgnition.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1124ping -n 5 127.0.0.1 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1184"C:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIIgnition.exe" -installC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIIgnition.exe
2b14373794ba0f8e1bb5e5986d4275503f16b1d2.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
LogMeIn Client
Exit code:
0
Version:
1.3.5538
Modules
Images
c:\users\admin\appdata\local\temp\ignabba.tmp\lmiignition.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
1480\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2960C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3164C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4128ping -n 5 127.0.0.1 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6284C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\IgnB5BC.tmp.cmd" "C:\Windows\SysWOW64\cmd.exeLMIIgnition.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6296\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
9 106
Read events
9 105
Write events
1
Delete events
0

Modification events

(PID) Process:(1184) LMIIgnition.exeKey:HKEY_CURRENT_USER\SOFTWARE\LogMeIn Ignition
Operation:writeName:@Salt
Value:
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
Executable files
9
Suspicious files
6
Text files
7
Unknown types
4

Dropped files

PID
Process
Filename
Type
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIGuardianSvc.exeexecutable
MD5:0927B7E7933491DAFD1A7B0876BF4578
SHA256:413DBAE208E147A42B9C7CE622CAAEDDE47E85462A6561EC41DB7FB1977C972D
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIGuardianEvt.dllexecutable
MD5:BDDD0F98E5A371119FA23A3350198F9E
SHA256:E4139D841096CF863AC8244E08F27B5BF7627ACC91264C08719FA5E326B557C5
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIGuardianDll.dllexecutable
MD5:7A44E3665F03C2E46912B59F1614417E
SHA256:41B48537B2DBEE585BF08B928591B05A116BC6B6780044FE5E35445E0A3C58E7
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIProxyHelper.exeexecutable
MD5:4AC517ECE48FA1683DF19E86EED922B1
SHA256:4C64AB865ECD6BDDE8414983E5520C2195B501379434D00A6EC6E357F62D4104
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\RACtrl.dllexecutable
MD5:CA26FFB2FBE9C7F58D16D7D8AA34A6B4
SHA256:C247B359CB9C2710E071DC1F74C354B09438F9C5A8E119ABF90CDB7BA62BE354
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\LMIIgnition.exeexecutable
MD5:CDBDF34821C788C28766E825F1033B5D
SHA256:8015E7E3BFB288702B25D831813962B65B9D9FE669CA7BECF6CF214084C47358
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\ractrlkeyhook.dllexecutable
MD5:2E82F902AA3A55D8C87B40F0DBAF3E38
SHA256:A7D3B22DEDAF702EDC7A06A338A50CA6996B3867D0D2C9DC767972DB9963D9C2
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\webview.dllexecutable
MD5:0A20B7A69963CFCF5892EDD327545990
SHA256:C265DF685D31F2E5BA706484E5AA53AF3DEE519DF20CDAF4607E48794D096A72
65802b14373794ba0f8e1bb5e5986d4275503f16b1d2.exeC:\Users\admin\AppData\Local\Temp\IgnABBA.tmp\WebView2Loader.dllexecutable
MD5:1ECC586392D0C11232B840D16428D28B
SHA256:E7FF2415D34A16314724B06D678A53E8D115E93F8EA0E714DC0932F2F102EC49
6388LMIGuardianSvc.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFAder
MD5:2C3729CC1DC7D07A2C22F12BF327A37F
SHA256:4CCD9106961771BD183503FDDAB62220985F8F025192642AAAFA5AAE80C181B3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
41
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6388
LMIGuardianSvc.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6388
LMIGuardianSvc.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
6388
LMIGuardianSvc.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAjegkJ27mLaGBP72%2FEoqPs%3D
unknown
whitelisted
6388
LMIGuardianSvc.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAc2N7ckVHzYR6z9KGYqXls%3D
unknown
whitelisted
6388
LMIGuardianSvc.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTjzY2p9Pa8oibmj%2BNSMWsz63kmWgQUuhbZbU2FL3MpdpovdYxqII%2BeyG8CEAVEr%2FOUnQg5pr%2FbP1%2FlYRY%3D
unknown
whitelisted
4048
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3908
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3908
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5512
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
1728
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
20.189.173.3:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
6388
LMIGuardianSvc.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1184
LMIIgnition.exe
158.120.24.40:443
check-out-f76dfc59d2.lmi-app26-12.logmein.com
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.181.238
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
check-out-f76dfc59d2.lmi-app26-12.logmein.com
  • 158.120.24.40
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.2
  • 40.126.31.71
  • 20.190.159.71
  • 20.190.159.4
  • 40.126.31.69
  • 40.126.31.67
  • 20.190.159.0
whitelisted
browser.pipe.aria.microsoft.com
  • 52.182.143.213
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted

Threats

No threats detected
No debug info