File name:

XeroxSmartStart_2.1.22.0.exe

Full analysis: https://app.any.run/tasks/32a8438c-067d-464c-bcc1-3f40d213be42
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 13, 2025, 13:02:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
reflection
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

EF5CB56ACF517375B8E3E273791A494A

SHA1:

448608BA9D770C46680D4C72CE1389BC9364C1D3

SHA256:

6EBC488A32BFEF6F8E9CC55BBD110DBFF99772B7CD34D28C5A1891D8B444E84A

SSDEEP:

98304:ZLgNx4uwjVKwjcYYMFvPkpNdjj7T02KjXGFDVW8550A/KfylKOICjyQUebS8pOK8:wEb7hM8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts Visual C# compiler

      • XeroxSmartStart.exe (PID: 6660)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • XeroxSmartStart_2.1.22.0.exe (PID: 6608)
      • csc.exe (PID: 1744)
    • Process drops legitimate windows executable

      • XeroxSmartStart_2.1.22.0.exe (PID: 6608)
    • Reads security settings of Internet Explorer

      • XeroxSmartStart.exe (PID: 6660)
    • Checks Windows Trust Settings

      • XeroxSmartStart.exe (PID: 6660)
    • The process hides Powershell's copyright startup banner

      • XeroxSmartStart.exe (PID: 6660)
    • The process bypasses the loading of PowerShell profile settings

      • XeroxSmartStart.exe (PID: 6660)
    • Starts POWERSHELL.EXE for commands execution

      • XeroxSmartStart.exe (PID: 6660)
    • Gets path to any of the special folders (POWERSHELL)

      • XeroxSmartStart.exe (PID: 6660)
    • Uses .NET C# to load dll

      • XeroxSmartStart.exe (PID: 6660)
    • Checks a user's role membership (POWERSHELL)

      • XeroxSmartStart.exe (PID: 6660)
    • Searches for installed software

      • XeroxSmartStart.exe (PID: 6660)
    • Detects reflection assembly loader (YARA)

      • XeroxSmartStart.exe (PID: 6660)
  • INFO

    • The sample compiled with english language support

      • XeroxSmartStart_2.1.22.0.exe (PID: 6608)
    • Checks supported languages

      • XeroxSmartStart_2.1.22.0.exe (PID: 6608)
      • XeroxSmartStart.exe (PID: 6660)
      • cvtres.exe (PID: 6096)
    • Create files in a temporary directory

      • XeroxSmartStart_2.1.22.0.exe (PID: 6608)
      • powershell.exe (PID: 2624)
      • XeroxSmartStart.exe (PID: 6660)
      • csc.exe (PID: 1744)
    • Reads the computer name

      • XeroxSmartStart.exe (PID: 6660)
    • Disables trace logs

      • XeroxSmartStart.exe (PID: 6660)
    • Checks proxy server information

      • XeroxSmartStart.exe (PID: 6660)
    • Reads the machine GUID from the registry

      • XeroxSmartStart.exe (PID: 6660)
      • csc.exe (PID: 1744)
    • Creates files in the program directory

      • XeroxSmartStart.exe (PID: 6660)
    • Creates files or folders in the user directory

      • XeroxSmartStart.exe (PID: 6660)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 2624)
    • Reads the software policy settings

      • powershell.exe (PID: 2624)
      • XeroxSmartStart.exe (PID: 6660)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • XeroxSmartStart.exe (PID: 6660)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (91.9)
.exe | Win32 Executable MS Visual C++ (generic) (3.3)
.exe | Win64 Executable (generic) (3)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2014:10:07 04:40:23+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 162816
UninitializedDataSize: 1024
EntryPoint: 0x30e2
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.1.22.0
ProductVersionNumber: 2.1.22.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Xerox Corporation
FileDescription: Xerox Smart Start Application
FileVersion: 2.1.22.0
LegalCopyright: © Xerox Corporation. All rights reserved.
ProductName: Xerox Smart Start
ProductVersion: 2.1.22.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start xeroxsmartstart_2.1.22.0.exe xeroxsmartstart.exe powershell.exe no specs conhost.exe no specs csc.exe conhost.exe no specs cvtres.exe no specs xeroxsmartstart_2.1.22.0.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1744"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\dnyveegw\dnyveegw.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
XeroxSmartStart.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2624"c:\windows\sysnative\windowspowershell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfileC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeXeroxSmartStart.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
4294967295
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
3224\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3772\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6096C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESA7CC.tmp" "c:\Users\admin\AppData\Local\Temp\dnyveegw\CSCF0D22943BBE84CF4BD5BAED76BAFCA3F.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6424"C:\Users\admin\AppData\Local\Temp\XeroxSmartStart_2.1.22.0.exe" C:\Users\admin\AppData\Local\Temp\XeroxSmartStart_2.1.22.0.exeexplorer.exe
User:
admin
Company:
Xerox Corporation
Integrity Level:
MEDIUM
Description:
Xerox Smart Start Application
Exit code:
3221226540
Version:
2.1.22.0
Modules
Images
c:\users\admin\appdata\local\temp\xeroxsmartstart_2.1.22.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6608"C:\Users\admin\AppData\Local\Temp\XeroxSmartStart_2.1.22.0.exe" C:\Users\admin\AppData\Local\Temp\XeroxSmartStart_2.1.22.0.exe
explorer.exe
User:
admin
Company:
Xerox Corporation
Integrity Level:
HIGH
Description:
Xerox Smart Start Application
Version:
2.1.22.0
Modules
Images
c:\users\admin\appdata\local\temp\xeroxsmartstart_2.1.22.0.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6660C:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\XeroxSmartStart.exe C:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\XeroxSmartStart.exe
XeroxSmartStart_2.1.22.0.exe
User:
admin
Company:
Xerox Corporation
Integrity Level:
HIGH
Description:
XeroxSmartStart.App
Version:
2.1.22.0
Modules
Images
c:\users\admin\appdata\local\temp\xerox\xss\x86\xeroxsmartstart.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
24 614
Read events
24 596
Write events
16
Delete events
2

Modification events

(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6660) XeroxSmartStart.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XeroxSmartStart_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
52
Suspicious files
10
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Dom.dllexecutable
MD5:FE9DA7C55886919C57ACAD024F181EBE
SHA256:8FB0911D54C38674C3F8A48E14E33F436666E28801AA3FDD48EE012ED0A812C3
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Css.dllexecutable
MD5:593F950D69F32FE566C1428C28A94641
SHA256:6563B4E229FF66FCF214003CE419FE080641AC325BA5A4A6870E7E4946E7B205
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Core.dllexecutable
MD5:187CFB5F81625550126D333B5FDF95E9
SHA256:67F473D33BB10EAE7DF6EB78A4E29024647499846E7FE356199FBABA546B543D
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Converters.Wpf.dllexecutable
MD5:17561A19FED0D0E8775DAB8E825F9E41
SHA256:95C5F20C28249467A5E26ACD2E19A6E63B23DE1447E4396544045BC2D80269A6
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Model.dllexecutable
MD5:0BBF8613A2DA97CDE3CF8AAF51EBC840
SHA256:812FA8CC034F3DEAEC17E1F4CF7F602243DBCC54B227E01F70AA56B88CDD31FC
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Rendering.Wpf.dllexecutable
MD5:33816B8B4202537A0992D44FAB81DA20
SHA256:C56E6BE56FB7A9DDDAC1C8F62BCD43E3B341C5CAE20C506CEC08D35E3B76D5C1
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Rendering.Gdi.dllexecutable
MD5:26918642C8AB151694D01DA0A438BFB5
SHA256:97012E48338551FEB48479A5A58A4DF2F9F32C173316ADE0472FE68C3C0B6B75
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\SharpVectors.Runtime.Wpf.dllexecutable
MD5:E9DA0CF7C9430999FFE500BA697EEEF8
SHA256:35670AC2C8F8807A0D5B24A243A3CE15F364DE6D2B0B7BC5EA79397167CA04BF
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\Microsoft.ApplicationInsights.dllexecutable
MD5:1EE57089B208E9F12317D509E9A18E07
SHA256:DD0951AD341E6EE453D0CC40EE4FF4969848885EA773D7A282A862ABF7ABF159
6608XeroxSmartStart_2.1.22.0.exeC:\Users\admin\AppData\Local\Temp\Xerox\XSS\x86\System.Diagnostics.DiagnosticSource.dllexecutable
MD5:680F54B3FBEF0F75D9903188D04CDEF7
SHA256:1887592615FC08BBC91AD62307C8C11DFC14C45BF120D271D66BE4A0D1A149A7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
40
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6660
XeroxSmartStart.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEEj8k7RgVZSNNqfJionWlBY%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6660
XeroxSmartStart.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSdE3gf41WAic8Uh9lF92%2BIJqh5qwQUMuuSmv81lkgvKEBCcCA2kVwXheYCEGIdbQxSAZ47kHkVIIkhHAo%3D
unknown
whitelisted
6800
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6660
XeroxSmartStart.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVD%2BnGf79Hpedv3mhy6uKMVZkPCQQUDyrLIIcouOxvSK4rVKYpqhekzQwCECUfQraqQDAOK6G7B%2FdAGD8%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.16.110.169:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.156
  • 23.48.23.143
  • 23.48.23.176
  • 23.48.23.166
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
www.bing.com
  • 2.16.110.169
  • 2.16.110.200
  • 2.16.110.176
  • 2.16.110.195
  • 2.16.110.193
  • 2.16.110.168
  • 2.16.110.184
  • 2.16.110.179
  • 2.16.110.203
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.64
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.73
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
www.xerox.com
  • 2.23.7.8
  • 2.23.7.42
  • 2.23.7.16
  • 2.23.7.41
  • 2.23.7.24
  • 2.23.7.25
  • 2.23.7.48
  • 2.23.7.11
  • 2.23.7.10
whitelisted
download.support.xerox.com
  • 23.48.23.163
  • 23.48.23.152
whitelisted

Threats

No threats detected
No debug info