download:

/roadmanlazer/NoEscape.exe-Download/archive/refs/heads/main.zip

Full analysis: https://app.any.run/tasks/ec98ca2e-ad81-4284-9b34-06a7917af6d9
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 14, 2025, 12:50:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
noescape
wiper
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

6DA84FD648C8811CC112F4FFFE20A24D

SHA1:

BA4F8D7FB51EE0A31B068CCA51D5E5388C4B081B

SHA256:

7B55DFAB141EB69ABBE47267E396FE8EE6BC4054FC8D4A5D91049B950C7D84AA

SSDEEP:

393216:8mpOKhF/fEB5KyYEvARy5DiydlufgDaDh5Z8sJzOvhz9R:8uB3f7koRseynegDU8sJzQR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • NOESCAPE has been detected

      • NoEscape.exe (PID: 2148)
      • winnt32.exe (PID: 4876)
    • Disables the Shutdown in the Start menu

      • NoEscape.exe (PID: 2148)
    • UAC/LUA settings modification

      • NoEscape.exe (PID: 2148)
    • Changes the login/logoff helper path in the registry

      • NoEscape.exe (PID: 2148)
    • Steals credentials from Web Browsers

      • chrmstp.exe (PID: 5336)
      • setup.exe (PID: 5608)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2284)
    • Reads security settings of Internet Explorer

      • NoEscape.exe (PID: 5436)
      • ShellExperienceHost.exe (PID: 4528)
    • Executable content was dropped or overwritten

      • NoEscape.exe (PID: 2148)
      • OneDriveSetup.exe (PID: 6936)
    • Application launched itself

      • NoEscape.exe (PID: 5436)
      • setup.exe (PID: 5608)
      • setup.exe (PID: 5672)
      • OneDriveSetup.exe (PID: 6840)
    • Reads Microsoft Outlook installation path

      • FirstLogonAnim.exe (PID: 5076)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 4452)
    • Reads Internet Explorer settings

      • FirstLogonAnim.exe (PID: 5076)
    • The process drops C-runtime libraries

      • OneDriveSetup.exe (PID: 6936)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 2284)
      • NoEscape.exe (PID: 2148)
      • OneDriveSetup.exe (PID: 6936)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2284)
    • Process checks computer location settings

      • NoEscape.exe (PID: 5436)
      • setup.exe (PID: 5672)
    • Reads the computer name

      • NoEscape.exe (PID: 5436)
      • NoEscape.exe (PID: 2148)
      • ShellExperienceHost.exe (PID: 4528)
      • chrmstp.exe (PID: 5336)
      • setup.exe (PID: 5608)
      • setup.exe (PID: 5672)
    • Manual execution by a user

      • NoEscape.exe (PID: 5436)
      • winnt32.exe (PID: 772)
      • FirstLogonAnim.exe (PID: 5076)
      • winnt32.exe (PID: 4148)
      • winnt32.exe (PID: 4144)
      • winnt32.exe (PID: 5316)
      • winnt32.exe (PID: 5580)
      • winnt32.exe (PID: 5892)
      • winnt32.exe (PID: 2508)
      • winnt32.exe (PID: 5936)
    • Checks supported languages

      • NoEscape.exe (PID: 2148)
      • NoEscape.exe (PID: 5436)
      • ShellExperienceHost.exe (PID: 4528)
      • PLUGScheduler.exe (PID: 4452)
      • winnt32.exe (PID: 4876)
      • winnt32.exe (PID: 772)
      • winnt32.exe (PID: 4144)
      • winnt32.exe (PID: 4148)
      • winnt32.exe (PID: 5184)
      • winnt32.exe (PID: 5204)
      • winnt32.exe (PID: 5316)
      • setup.exe (PID: 5608)
      • chrmstp.exe (PID: 5336)
      • winnt32.exe (PID: 5580)
      • setup.exe (PID: 5632)
      • setup.exe (PID: 5672)
      • winnt32.exe (PID: 2508)
    • Creates files in the program directory

      • NoEscape.exe (PID: 2148)
      • PLUGScheduler.exe (PID: 4452)
      • chrmstp.exe (PID: 5336)
      • setup.exe (PID: 5608)
    • Creates files or folders in the user directory

      • NoEscape.exe (PID: 2148)
    • Reads security settings of Internet Explorer

      • unregmp2.exe (PID: 1096)
      • unregmp2.exe (PID: 5136)
      • FirstLogonAnim.exe (PID: 5076)
      • OneDriveSetup.exe (PID: 6840)
    • Application launched itself

      • chrmstp.exe (PID: 5336)
      • chrmstp.exe (PID: 5396)
    • Reads Microsoft Office registry keys

      • setup.exe (PID: 5608)
    • The sample compiled with chinese language support

      • OneDriveSetup.exe (PID: 6936)
    • Reads the software policy settings

      • OneDriveSetup.exe (PID: 6936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2021:03:25 03:55:22
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: NoEscape.exe-Download-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
324
Monitored processes
36
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe filecoauth.exe no specs slui.exe no specs rundll32.exe no specs noescape.exe no specs #NOESCAPE noescape.exe shellexperiencehost.exe no specs plugscheduler.exe no specs winnt32.exe no specs firstlogonanim.exe no specs winnt32.exe no specs unregmp2.exe no specs winnt32.exe no specs winnt32.exe no specs unregmp2.exe no specs winnt32.exe no specs winnt32.exe no specs unregmp2.exe no specs unregmp2.exe no specs winnt32.exe no specs chrmstp.exe chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs winnt32.exe no specs setup.exe setup.exe no specs setup.exe no specs setup.exe no specs winnt32.exe no specs fsquirt.exe no specs winnt32.exe no specs onedrivesetup.exe no specs winnt32.exe no specs wab.exe no specs onedrivesetup.exe

Process information

PID
CMD
Path
Indicators
Parent process
772"C:\WINDOWS\winnt32.exe" "C:\Windows\System32\unregmp2.exe" /FirstLogonC:\Windows\winnt32.exeexplorer.exe
User:
Administrator
Company:
Endermanch
Integrity Level:
HIGH
Description:
Windows Customization Tool
Exit code:
0
Version:
6.6.6.6
Modules
Images
c:\windows\winnt32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1096e" /FirstLogonC:\Windows\SysWOW64\unregmp2.exewinnt32.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Windows Media Player Setup Utility
Exit code:
0
Version:
12.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\unregmp2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1512C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
1073807364
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2148"C:\Users\admin\Desktop\NoEscape.exe-Download-main\NoEscape.exe\NoEscape.exe" C:\Users\admin\Desktop\NoEscape.exe-Download-main\NoEscape.exe\NoEscape.exe
NoEscape.exe
User:
admin
Company:
Endermanch
Integrity Level:
HIGH
Description:
Windows Customization Tool
Exit code:
0
Version:
6.6.6.6
Modules
Images
c:\users\admin\desktop\noescape.exe-download-main\noescape.exe\noescape.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2284"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Downloads\main.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2508"C:\WINDOWS\winnt32.exe" "C:\Program Files\Windows Mail\wab.exe" /UpgradeC:\Windows\winnt32.exeexplorer.exe
User:
Administrator
Company:
Endermanch
Integrity Level:
HIGH
Description:
Windows Customization Tool
Exit code:
0
Version:
6.6.6.6
Modules
Images
c:\windows\winnt32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2644e" /UpgradeC:\Program Files\Windows Mail\wab.exewinnt32.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Contacts
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows mail\wab.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\gdi32.dll
3888C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
4144"C:\WINDOWS\winnt32.exe" "C:\Windows\System32\ie4uinit.exe" -UserConfigC:\Windows\winnt32.exeexplorer.exe
User:
Administrator
Company:
Endermanch
Integrity Level:
HIGH
Description:
Windows Customization Tool
Exit code:
0
Version:
6.6.6.6
Modules
Images
c:\windows\winnt32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
4148"C:\WINDOWS\winnt32.exe" "C:\Windows\System32\unregmp2.exe" /FirstLogonC:\Windows\winnt32.exeexplorer.exe
User:
Administrator
Company:
Endermanch
Integrity Level:
HIGH
Description:
Windows Customization Tool
Exit code:
0
Version:
6.6.6.6
Modules
Images
c:\windows\winnt32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
Total events
11 523
Read events
11 468
Write events
53
Delete events
2

Modification events

(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\main.zip
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(2284) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
138
Suspicious files
227
Text files
77
Unknown types
2

Dropped files

PID
Process
Filename
Type
2148NoEscape.exeC:\Users\Public\Desktop\ऎᢍᶀ₝ᆗṘᩰᎼᦁᎼᝀጘਖ਼ᛇ◉ᔴbinary
MD5:E49F0A8EFFA6380B4518A8064F6D240B
SHA256:8DBD06E9585C5A16181256C9951DBC65621DF66CEB22C8E3D2304477178BEE13
2148NoEscape.exeC:\Users\Public\Desktop\ᣪ౯ᮇኴᎭጵ᩶ᣰս۫⚎׾〤⥴ஐ➈⩗binary
MD5:E49F0A8EFFA6380B4518A8064F6D240B
SHA256:8DBD06E9585C5A16181256C9951DBC65621DF66CEB22C8E3D2304477178BEE13
2148NoEscape.exeC:\Users\Public\Desktop\፺⹣⌶ᣚ୳௩Ɐ〡ৣⅤࡱໝᣏ∲໳ߚᒾ≯⯻┹ᩗ⢁९᤯ᣢbinary
MD5:E49F0A8EFFA6380B4518A8064F6D240B
SHA256:8DBD06E9585C5A16181256C9951DBC65621DF66CEB22C8E3D2304477178BEE13
2284WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2284.43203\NoEscape.exe-Download-main\NoEscape.exe\NoEscape.exeexecutable
MD5:989AE3D195203B323AA2B3ADF04E9833
SHA256:D30D7676A3B4C91B77D403F81748EBF6B8824749DB5F860E114A8A204BCA5B8F
2148NoEscape.exeC:\ProgramData\Microsoft\User Account Pictures\user.bmpimage
MD5:2AB3698B005B421349512142ED6B965E
SHA256:150E95DA6C1E09511241130DA0E376878F5E24E21C2A9DFE7FBCC1022660E29F
2148NoEscape.exeC:\ProgramData\Microsoft\User Account Pictures\user-32.pngimage
MD5:5D572D54E293ACD90D5B8AD6036333DA
SHA256:4810DC6C101937DDE12D4581DE81E608EA144761D1307779DC6A256872330EDE
2148NoEscape.exeC:\ProgramData\Microsoft\User Account Pictures\user-40.pngimage
MD5:D8E22EF10BD7AB65F56220D2845D6A94
SHA256:B115A4548AD8E9C7CADB707A0FF79FCD55D9D900EEFA7A922CA50C85C4D3CA1D
3888FileCoAuth.exeC:\Users\admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-04-14.1251.3888.1.aodlbinary
MD5:28DCA2FF4B34B5A52A2E59DF202A6ED3
SHA256:33BACCB7296F1ED1F995FC77A23049F261CF391AC0388F9E8DD161F8C17B7F94
3888FileCoAuth.exeC:\Users\admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-04-14.1251.3888.1.odlbinary
MD5:5B6C6243B42BDEAC4AACC8112B41442F
SHA256:E9E5A95A816776154FD35F849BADD8F9817BD3106AB8877546D82BABC7BF7D6C
2148NoEscape.exeC:\Users\Public\Desktop\࢐តᕰ♫ऐᬷ᷐ᒘᇶᛂ᜕ಳ□ⷬआⴝ⋁ủ⚃᜵ᯔ༨⺽ⵎ⤊⑉ଊbinary
MD5:E49F0A8EFFA6380B4518A8064F6D240B
SHA256:8DBD06E9585C5A16181256C9951DBC65621DF66CEB22C8E3D2304477178BEE13
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
86
DNS requests
30
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
40.126.31.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.238
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.130
  • 20.190.159.129
  • 20.190.159.75
  • 40.126.31.67
  • 20.190.159.128
  • 20.190.159.131
  • 40.126.31.73
  • 40.126.31.128
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
  • 2603:1030:408:7::3d
whitelisted
198.187.3.20.in-addr.arpa
unknown
d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
  • 52.111.236.22
whitelisted

Threats

No threats detected
No debug info