File name:

HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.7z

Full analysis: https://app.any.run/tasks/c2b200de-21cf-47d8-a449-b445550c0b28
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 23, 2025, 23:12:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

F0C0A4F34B8E3B48AD508A3693E1B21B

SHA1:

0E21ED87770E2F46A52FBE67AE554A6172ED53E6

SHA256:

6E04AEEDFA72D074EB511906209832A4B3019CB2C6EBE77CD3CB99865F4D6F12

SSDEEP:

384:knfTBXnpr6H3Ab/UiCTxhbepId9ahbZ4MeJFpl6KJQvxMyJ2dudEOwZxZ:kf9s3AzUiCTeI9ahbZ49Vvq2dbzB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
    • Steals credentials from Web Browsers

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
    • Scans artifacts that could help determine the target

      • dw20.exe (PID: 7880)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
    • Probably obfuscated PowerShell command line is found

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
    • Reads the date of Windows installation

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
      • dw20.exe (PID: 7880)
    • Removes files via Powershell

      • powershell.exe (PID: 7768)
    • Starts POWERSHELL.EXE for commands execution

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
    • Likely accesses (executes) a file from the Public directory

      • powershell.exe (PID: 7768)
  • INFO

    • Manual execution by a user

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5596)
    • Checks supported languages

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
      • dw20.exe (PID: 7880)
    • Reads the computer name

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
      • dw20.exe (PID: 7880)
    • Process checks computer location settings

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
      • dw20.exe (PID: 7880)
    • Reads the machine GUID from the registry

      • HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe (PID: 7656)
      • dw20.exe (PID: 7880)
    • Creates files in the program directory

      • dw20.exe (PID: 7880)
    • Reads Environment values

      • dw20.exe (PID: 7880)
    • Reads CPU info

      • dw20.exe (PID: 7880)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7768)
    • Creates files or folders in the user directory

      • dw20.exe (PID: 7880)
    • Reads the software policy settings

      • dw20.exe (PID: 7880)
    • Checks proxy server information

      • dw20.exe (PID: 7880)
    • Reads product name

      • dw20.exe (PID: 7880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2021:06:13 12:18:18+00:00
ArchivedFileName: HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
8
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs heur-trojan-ransom.msil.encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe conhost.exe no specs powershell.exe no specs conhost.exe no specs dw20.exe

Process information

PID
CMD
Path
Indicators
Parent process
5596"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\c2b200de-21cf-47d8-a449-b445550c0b28.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6156"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6964C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7656"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
_CShardRunPE
Exit code:
3762507597
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.msil.encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7668\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7768"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $source = 'C:\Users\Public\Libraries\DATA';$archive = 'C:\Users\Public\Libraries\';$Name = [Environment]::MachineName+'DATA.zip';$destination = 'C:\Users\Public\Libraries\';$ArchiveFile = Join-Path -Path $archive -ChildPath $Name;MD $archive -EA 0 | Out-Null;If(Test-path $ArchiveFile) {Remove-item $ArchiveFile}Add-Type -assembly 'system.io.compression.filesystem';[io.compression.zipfile]::CreateFromDirectory($Source, $ArchiveFile);Copy-Item -Path $ArchiveFile -Destination $destination -Force;C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeHEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
7776\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7880dw20.exe -x -s 968C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Error Reporting Shim
Exit code:
0
Version:
2.0.50727.9149 (WinRelRS6.050727-9100)
Modules
Images
c:\windows\microsoft.net\framework64\v2.0.50727\dw20.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
9 394
Read events
9 371
Write events
21
Delete events
2

Modification events

(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\c2b200de-21cf-47d8-a449-b445550c0b28.7z
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(5596) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
1
Suspicious files
7
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
7880dw20.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_TTQPCE32NKSOHSWZ_9935e8db79cc679cb83b2e95aa10d13a4c34f89_00000000_9452a984-f1ae-4270-ae57-45ded527f041\Report.wer
MD5:
SHA256:
7768powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_b0xsowpz.1ym.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7880dw20.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF0BB.tmp.WERInternalMetadata.xmlbinary
MD5:C9BABBF28DEC4C3EC8B10F1C24C8481A
SHA256:1F52EE2825FCF004BA945225ABCA6D4E9AA0BC4C356D291C77C897D30A4D3D5B
7880dw20.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF0EB.tmp.xmlxml
MD5:EE22831C39B9DAF3FE5E1AACCC288146
SHA256:0BB285C0C88C08C3BE5AF47906419A182FD23C63546D5CF9D39239B4099BAD0A
7880dw20.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:3B5E0BD6640456A749D9155E6C135727
SHA256:C362A3D2B661C6066A02FC169FAAA1976C2F6160DA5837C7E68B7E0F67B794ED
5596WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb5596.36755\HEUR-Trojan-Ransom.MSIL.Encoder.gen-84a236e359ee08b7bb04d02e39b7dc694952467db99c4a62d88b2d07ae51f46d.exeexecutable
MD5:9EF43DD22FB681FE42507AC0C5A742E3
SHA256:84A236E359EE08B7BB04D02E39B7DC694952467DB99C4A62D88B2D07AE51F46D
7768powershell.exeC:\Users\Public\Libraries\DESKTOP-JGLLJLDDATA.zipcompressed
MD5:097728830A5D5BE08EA43DBFF39B5A4B
SHA256:E7CB8E7A9A8D6F3D07BAB48EC657ADC8572FAC0137B7F546776D087A8402AAA2
7880dw20.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:833F932F3F77D92C284F69C8B713688B
SHA256:A2A0F9958798F687A6FF49B36B404FD0C60DDB49F1524606AE160FE507F8405D
7768powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:B9E15852BE04BDFFABD6AB18D1FEC223
SHA256:AB53938F8D2B12ADF9398FDF171FE350D4A24C31EB6988D31469F26014A67A29
7880dw20.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:680B0331A3CC8FCCE16367586EC7A721
SHA256:19F1B5D2C7F62663C14D97578411DC610E5F33E6CE4165977314442435F15305
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
25
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7880
dw20.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
900
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7880
dw20.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8168
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8168
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
900
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
900
backgroundTaskHost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 172.217.23.110
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.138
  • 40.126.32.133
  • 20.190.160.131
  • 20.190.160.67
  • 40.126.32.140
  • 20.190.160.14
  • 20.190.160.5
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
watson.events.data.microsoft.com
  • 52.168.117.173
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info