File name:

NDI 6 Runtime.exe

Full analysis: https://app.any.run/tasks/1f6d32df-6450-4dcb-8fd8-b636af5056a3
Verdict: Malicious activity
Analysis date: January 14, 2025, 18:49:01
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

55A486CFB4E8E5F319EDA8FBAF38AE7A

SHA1:

A142A05554B07277B46BFB280D9D26DC2886DC67

SHA256:

93BAED79F27203C61A090093BD4A1BAFBB606C6A8E768D9DEA650AD23B7BDF71

SSDEEP:

98304:k+QqZ8fUCdg3mKSiNH7R+9cJH7wgFZ8wmTPQeLbmQfx1DRqUmCATz05CJswNDd/B:n87ZAWHmfGPOOt7xSAENp+5Qgq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • NDI 6 Runtime.tmp (PID: 4708)
    • Changes the autorun value in the registry

      • netsh.exe (PID: 5160)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • NDI 6 Runtime.tmp (PID: 6016)
    • Executable content was dropped or overwritten

      • NDI 6 Runtime.exe (PID: 6136)
      • NDI 6 Runtime.exe (PID: 7152)
      • NDI 6 Runtime.tmp (PID: 4708)
    • Suspicious use of NETSH.EXE

      • cmd.exe (PID: 6752)
      • cmd.exe (PID: 4544)
    • Reads the Windows owner or organization settings

      • NDI 6 Runtime.tmp (PID: 4708)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 6560)
      • regsvr32.exe (PID: 6472)
    • Starts CMD.EXE for commands execution

      • NDI 6 Runtime.tmp (PID: 4708)
  • INFO

    • Create files in a temporary directory

      • NDI 6 Runtime.exe (PID: 7152)
      • NDI 6 Runtime.exe (PID: 6136)
    • Checks supported languages

      • NDI 6 Runtime.exe (PID: 6136)
      • NDI 6 Runtime.exe (PID: 7152)
      • NDI 6 Runtime.tmp (PID: 6016)
      • NDI 6 Runtime.tmp (PID: 4708)
      • _setup64.tmp (PID: 6452)
    • Process checks computer location settings

      • NDI 6 Runtime.tmp (PID: 6016)
    • Reads the computer name

      • NDI 6 Runtime.tmp (PID: 6016)
      • NDI 6 Runtime.tmp (PID: 4708)
    • Creates files in the program directory

      • NDI 6 Runtime.tmp (PID: 4708)
    • The sample compiled with english language support

      • NDI 6 Runtime.tmp (PID: 4708)
    • Creates a software uninstall entry

      • NDI 6 Runtime.tmp (PID: 4708)
    • Disables trace logs

      • netsh.exe (PID: 3680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:15 09:48:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741376
InitializedDataSize: 290304
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 6.0.1.0
ProductVersionNumber: 6.0.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: NDI
FileDescription: NDI 6 Runtime Setup
FileVersion: 6.0.1.0
LegalCopyright: Copyright © 2023-2024 Vizrt NDI AB. All rights reserved.
OriginalFileName:
ProductName: NDI 6 Runtime
ProductVersion: 6.0.1.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
14
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ndi 6 runtime.exe ndi 6 runtime.tmp no specs ndi 6 runtime.exe ndi 6 runtime.tmp _setup64.tmp no specs conhost.exe no specs regsvr32.exe no specs regsvr32.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe cmd.exe no specs conhost.exe no specs netsh.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3680netsh int tcp resetC:\Windows\System32\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
3692\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4328\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4544"cmd" /c netsh int tcp resetC:\Windows\System32\cmd.exeNDI 6 Runtime.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4708"C:\Users\admin\AppData\Local\Temp\is-H9AD9.tmp\NDI 6 Runtime.tmp" /SL5="$5035E,8988195,1032704,C:\Users\admin\AppData\Local\Temp\NDI 6 Runtime.exe" /SPAWNWND=$602C6 /NOTIFYWND=$602B0 C:\Users\admin\AppData\Local\Temp\is-H9AD9.tmp\NDI 6 Runtime.tmp
NDI 6 Runtime.exe
User:
admin
Company:
NDI
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-h9ad9.tmp\ndi 6 runtime.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
5160netsh winsock resetC:\Windows\System32\netsh.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5464\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe_setup64.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6016"C:\Users\admin\AppData\Local\Temp\is-SO3UF.tmp\NDI 6 Runtime.tmp" /SL5="$602B0,8988195,1032704,C:\Users\admin\AppData\Local\Temp\NDI 6 Runtime.exe" C:\Users\admin\AppData\Local\Temp\is-SO3UF.tmp\NDI 6 Runtime.tmpNDI 6 Runtime.exe
User:
admin
Company:
NDI
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-so3uf.tmp\ndi 6 runtime.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
6136"C:\Users\admin\AppData\Local\Temp\NDI 6 Runtime.exe" /SPAWNWND=$602C6 /NOTIFYWND=$602B0 C:\Users\admin\AppData\Local\Temp\NDI 6 Runtime.exe
NDI 6 Runtime.tmp
User:
admin
Company:
NDI
Integrity Level:
HIGH
Description:
NDI 6 Runtime Setup
Exit code:
0
Version:
6.0.1.0
Modules
Images
c:\users\admin\appdata\local\temp\ndi 6 runtime.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6452helper 105 0x4A0C:\Users\admin\AppData\Local\Temp\is-EM9J9.tmp\_isetup\_setup64.tmpNDI 6 Runtime.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\is-em9j9.tmp\_isetup\_setup64.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
2 347
Read events
1 872
Write events
352
Delete events
123

Modification events

(PID) Process:(4708) NDI 6 Runtime.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\NewTek\InstallVersion\{{71AFF296-ED43-4166-8301-4649285EE712}
Operation:writeName:upgrade_version
Value:
240506
(PID) Process:(4708) NDI 6 Runtime.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\NewTek\InstallVersion\NdiRedistributable
Operation:writeName:upgrade_version
Value:
240506
(PID) Process:(6472) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\NDI
Operation:writeName:Source Filter
Value:
{90F86EFC-87CF-4097-9FCE-0C11D573FF8F}
(PID) Process:(6472) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\NDI
Operation:writeName:Runtime
Value:
1
(PID) Process:(6472) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{90F86EFC-87CF-4097-9FCE-0C11D573FF8F}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
(PID) Process:(6472) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{90F86EFC-87CF-4097-9FCE-0C11D573FF8F}
Operation:writeName:FilterData
Value:
02000000000020000100000000000000307069330800000000000000010000000000000000000000307479330000000038000000480000007669647300001000800000AA00389B7100000000000000000000000000000000
(PID) Process:(4708) NDI 6 Runtime.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{71AFF296-ED43-4166-8301-4649285EE712}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.1.2
(PID) Process:(4708) NDI 6 Runtime.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{71AFF296-ED43-4166-8301-4649285EE712}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files\NDI\NDI 6 Runtime\v6
(PID) Process:(4708) NDI 6 Runtime.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{71AFF296-ED43-4166-8301-4649285EE712}_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files\NDI\NDI 6 Runtime\v6\
(PID) Process:(4708) NDI 6 Runtime.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{71AFF296-ED43-4166-8301-4649285EE712}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
NDI 6 Runtime
Executable files
16
Suspicious files
3
Text files
2
Unknown types
4

Dropped files

PID
Process
Filename
Type
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\is-3SB67.tmp
MD5:
SHA256:
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\Processing.NDI.Lib.DirectShow.x64.dll
MD5:
SHA256:
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\is-AD8I9.tmpurl
MD5:8F9095160A7EBCA3FB512962BDD45F7D
SHA256:D609C58A98B55E16B7867F31D79D2F05CBA0A65BEB0B5576F8FEA31FCB609DDB
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\NDI Information.urlurl
MD5:8F9095160A7EBCA3FB512962BDD45F7D
SHA256:D609C58A98B55E16B7867F31D79D2F05CBA0A65BEB0B5576F8FEA31FCB609DDB
4708NDI 6 Runtime.tmpC:\Users\admin\AppData\Local\Temp\is-EM9J9.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\Processing.NDI.Lib.DirectShow.x86.dllexecutable
MD5:A0202FCC61964F1CC33BD927B82AC349
SHA256:EFF90115E2E3F4143ED71240A72FAE1238DA59546F9D11D1720D4F4C823EFD1C
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\is-PKTRN.tmpexecutable
MD5:E58D8524AFBC7E1BAEA23A34C6C9CBBA
SHA256:09B659956613AD41EB29073311291C997C0A536820A94754985D6A5E448A5EEC
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\Processing.NDI.Lib.UWP.x86.dllexecutable
MD5:2435CAA9AAC46E2434BB08424A586249
SHA256:125DC1D796F33DE714337ED0811C68559970896BA1F5F5F59163BC00D45A0C2C
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\is-K41I1.tmpexecutable
MD5:2435CAA9AAC46E2434BB08424A586249
SHA256:125DC1D796F33DE714337ED0811C68559970896BA1F5F5F59163BC00D45A0C2C
4708NDI 6 Runtime.tmpC:\Program Files\NDI\NDI 6 Runtime\v6\is-IETJH.tmpexecutable
MD5:A0202FCC61964F1CC33BD927B82AC349
SHA256:EFF90115E2E3F4143ED71240A72FAE1238DA59546F9D11D1720D4F4C823EFD1C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
32
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
836
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6648
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
836
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 23.52.120.96
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.73
  • 40.126.31.67
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.23
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info