File name:

Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe

Full analysis: https://app.any.run/tasks/7b599664-dfd4-4816-bd92-eab9e1e6f06b
Verdict: Malicious activity
Analysis date: July 04, 2024, 03:59:55
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

4C793953CFC69E13AB9490E786BB9920

SHA1:

DBA02A794CDAB7C307409151D4060CEC655C7884

SHA256:

E1459D69B38764A1EC3497127B44108541AC446C166B2F2A3475C87585BFB5D2

SSDEEP:

98304:hosbzrcEnyoBDJ2ogp9hn5yshbz2FnBs/9S4dv/oC7UCtZ9ONOHX6meCRo7cF6lP:1XezwSaJiy6CWel

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe (PID: 2104)
      • setup.exe (PID: 5324)
      • setup.exe (PID: 6400)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • setup.exe (PID: 5324)
      • Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe (PID: 2104)
      • setup.exe (PID: 6400)
    • The process creates files with name similar to system file names

      • setup.exe (PID: 5324)
      • setup.exe (PID: 6400)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • setup.exe (PID: 5324)
      • setup.exe (PID: 6400)
    • Reads security settings of Internet Explorer

      • setup.exe (PID: 5324)
      • foobar2000.exe (PID: 6772)
    • Reads the date of Windows installation

      • setup.exe (PID: 5324)
    • Application launched itself

      • setup.exe (PID: 5324)
    • The process drops C-runtime libraries

      • setup.exe (PID: 6400)
    • Creates/Modifies COM task schedule object

      • setup.exe (PID: 6400)
    • Process drops legitimate windows executable

      • setup.exe (PID: 6400)
    • Creates a software uninstall entry

      • setup.exe (PID: 6400)
    • Changes default file association

      • foobar2000 Shell Associations Updater.exe (PID: 6720)
  • INFO

    • Create files in a temporary directory

      • Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe (PID: 2104)
      • setup.exe (PID: 5324)
      • setup.exe (PID: 6400)
      • foobar2000.exe (PID: 6692)
    • Reads the computer name

      • Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe (PID: 2104)
      • setup.exe (PID: 5324)
      • setup.exe (PID: 6400)
      • foobar2000.exe (PID: 6772)
    • Checks supported languages

      • Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe (PID: 2104)
      • setup.exe (PID: 5324)
      • setup.exe (PID: 6400)
      • foobar2000.exe (PID: 6692)
      • foobar2000.exe (PID: 6772)
      • foobar2000 Shell Associations Updater.exe (PID: 6720)
    • Process checks computer location settings

      • setup.exe (PID: 5324)
    • Creates files in the program directory

      • setup.exe (PID: 6400)
    • Creates files or folders in the user directory

      • foobar2000.exe (PID: 6692)
      • foobar2000.exe (PID: 6772)
    • Reads the software policy settings

      • slui.exe (PID: 3152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:06:20 12:17:24+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 1229824
InitializedDataSize: 691712
UninitializedDataSize: -
EntryPoint: 0x11de8c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.1.5.0
ProductVersionNumber: 2.1.5.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Efficacious Approval Applications
FileDescription: Efficacious Approval Applications
FileVersion: 2.1.5.0
LegalCopyright: Copyright 2003-2023 Efficacious Approval Applications
ProductName: Efficacious Approval Applications
ProductVersion: 2.1.5.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
9
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start resident-evil-4-ultimate-hd-edition-v1.1.0_923224.exe setup.exe setup.exe foobar2000.exe no specs foobar2000 shell associations updater.exe no specs foobar2000.exe no specs sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2104"C:\Users\admin\AppData\Local\Temp\Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe" C:\Users\admin\AppData\Local\Temp\Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe
explorer.exe
User:
admin
Company:
Efficacious Approval Applications
Integrity Level:
MEDIUM
Description:
Efficacious Approval Applications
Exit code:
0
Version:
2.1.5.0
Modules
Images
c:\users\admin\appdata\local\temp\resident-evil-4-ultimate-hd-edition-v1.1.0_923224.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3152"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5324.\setup.exeC:\Users\admin\AppData\Local\Temp\7zS838CE8FC\setup.exe
Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe
User:
admin
Company:
foobar2000.org
Integrity Level:
MEDIUM
Description:
foobar2000 Installer
Exit code:
0
Version:
2.1.4
Modules
Images
c:\users\admin\appdata\local\temp\7zs838ce8fc\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
5624C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6400"C:\Users\admin\AppData\Local\Temp\7zS838CE8FC\setup.exe" /UAC:602C4 /NCRCC:\Users\admin\AppData\Local\Temp\7zS838CE8FC\setup.exe
setup.exe
User:
admin
Company:
foobar2000.org
Integrity Level:
HIGH
Description:
foobar2000 Installer
Exit code:
0
Version:
2.1.4
Modules
Images
c:\users\admin\appdata\local\temp\7zs838ce8fc\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
6456C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6692"C:\Program Files (x86)\foobar2000\foobar2000.exe" /install /quiet /exportshelldata "C:\Users\admin\AppData\Local\Temp\fb2kshelldata.tmp"C:\Program Files (x86)\foobar2000\foobar2000.exesetup.exe
User:
admin
Company:
Piotr Pawlowski
Integrity Level:
MEDIUM
Description:
foobar2000
Exit code:
0
Version:
2.1.4.0
Modules
Images
c:\program files (x86)\foobar2000\foobar2000.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
6720"C:\Program Files (x86)\foobar2000\foobar2000 Shell Associations Updater.exe" "C:\Users\admin\AppData\Local\Temp\fb2kshelldata.tmp"C:\Program Files (x86)\foobar2000\foobar2000 Shell Associations Updater.exesetup.exe
User:
admin
Company:
Peter Pawlowski
Integrity Level:
HIGH
Description:
foobar2000 Shell Associations Updater
Exit code:
0
Version:
1, 0, 0, 0
Modules
Images
c:\program files (x86)\foobar2000\foobar2000 shell associations updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6772"C:\Program Files (x86)\foobar2000\foobar2000.exe" C:\Program Files (x86)\foobar2000\foobar2000.exesetup.exe
User:
admin
Company:
Piotr Pawlowski
Integrity Level:
MEDIUM
Description:
foobar2000
Exit code:
0
Version:
2.1.4.0
Modules
Images
c:\program files (x86)\foobar2000\foobar2000.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
Total events
9 522
Read events
9 226
Write events
296
Delete events
0

Modification events

(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\Fb2kShellExt.DLL
Operation:writeName:AppID
Value:
{3B3052C5-E430-4A00-84C9-BFD43336940B}
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A35F9F4-F4BE-471A-890D-E09FFA6B38AD}
Operation:writeName:AppID
Value:
{0A35F9F4-F4BE-471A-890D-E09FFA6B38AD}
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A35F9F4-F4BE-471A-890D-E09FFA6B38AD}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{0A35F9F4-F4BE-471A-890D-E09FFA6B38AD}
Operation:writeName:DllSurrogate
Value:
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\foobar2000
Operation:writeName:InstallDir
Value:
C:\Program Files (x86)\foobar2000
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\foobar2000.exe
Operation:writeName:UseUrl
Value:
1
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\foobar2000
Operation:writeName:DefaultIcon
Value:
C:\Program Files (x86)\foobar2000\foobar2000.exe
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\foobar2000
Operation:writeName:Action
Value:
Play
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\foobar2000
Operation:writeName:InvokeVerb
Value:
open
(PID) Process:(6400) setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\foobar2000
Operation:writeName:Provider
Value:
foobar2000
Executable files
93
Suspicious files
50
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
5324setup.exeC:\Users\admin\AppData\Local\Temp\nsoFFC6.tmp\modern-header.bmpimage
MD5:D0A335B55AEA042DBA383CB9EB91C093
SHA256:60F9E6030D4C75E5ED7E9300FB13FD46346D581E2039AE5E9A66DA72984C78F5
5324setup.exeC:\Users\admin\AppData\Local\Temp\nsoFFC6.tmp\UAC.dllexecutable
MD5:3FA5491C158C30082B42569CF4F54381
SHA256:560BA0A768687A5B8643062B6183991E4D8E172B870E3C0A8A8847043CE32C86
6400setup.exeC:\Users\admin\AppData\Local\Temp\nsj19F5.tmp\System.dllexecutable
MD5:192639861E3DC2DC5C08BB8F8C7260D5
SHA256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
5324setup.exeC:\Users\admin\AppData\Local\Temp\nsoFFC6.tmp\nsDialogs.dllexecutable
MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
SHA256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
6400setup.exeC:\Users\admin\AppData\Local\Temp\nsj19F5.tmp\UAC.dllexecutable
MD5:3FA5491C158C30082B42569CF4F54381
SHA256:560BA0A768687A5B8643062B6183991E4D8E172B870E3C0A8A8847043CE32C86
5324setup.exeC:\Users\admin\AppData\Local\Temp\nsoFFC6.tmp\modern-wizard.bmpimage
MD5:4E50C5083442A80CCAD90B7249517327
SHA256:DCF6F31126374385B6B626C81262CDC29A1766E0AEB60AA830BCA2EF97684023
6400setup.exeC:\Users\admin\AppData\Local\Temp\nsj19F5.tmp\nsDialogs.dllexecutable
MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
SHA256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
6400setup.exeC:\Program Files (x86)\foobar2000\avutil-fb2k-58.dllexecutable
MD5:7B5A19D59E16243EE5FA626D2C85F591
SHA256:6989E896E11FFB32599BA3171C1BA621760B8B3A17C528D49C249CA6A6829375
6400setup.exeC:\Program Files (x86)\foobar2000\concrt140.dllexecutable
MD5:B94CD71FCB75E0A3DE90060AEAA09254
SHA256:43B77564672E91D726099DD8400EF051FEB14E1F44343EC3F8804F4542B60BF1
6400setup.exeC:\Program Files (x86)\foobar2000\PP-UWP-Interop.dllexecutable
MD5:48A7C1F9E5E9B7556FFE21881D1C14C6
SHA256:F41D7B5EDEBBFAAA062E41112EBEC85210A2877F0E0338F05237BC817AB17D94
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
76
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
3716
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
900
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
900
MoUsoCoreWorker.exe
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
2088
SIHClient.exe
GET
200
23.211.9.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
2088
SIHClient.exe
GET
200
23.211.9.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
2268
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
3040
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
5228
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1856
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
unknown
2476
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
900
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2104
Resident-Evil-4-Ultimate-HD-Edition-v1.1.0_923224.exe
104.26.8.6:443
codeonicinc.com
CLOUDFLARENET
US
unknown
4032
svchost.exe
239.255.255.250:1900
unknown
4656
SearchApp.exe
104.126.37.128:443
www.bing.com
Akamai International B.V.
DE
unknown
4656
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
3716
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3716
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown

DNS requests

Domain
IP
Reputation
codeonicinc.com
  • 104.26.8.6
  • 104.26.9.6
  • 172.67.69.54
unknown
www.bing.com
  • 104.126.37.128
  • 104.126.37.130
  • 104.126.37.160
  • 104.126.37.177
  • 104.126.37.153
  • 104.126.37.171
  • 104.126.37.176
  • 104.126.37.170
  • 104.126.37.163
  • 184.86.251.22
  • 184.86.251.19
  • 184.86.251.9
  • 184.86.251.7
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
login.live.com
  • 40.126.32.74
  • 40.126.32.138
  • 40.126.32.76
  • 40.126.32.134
  • 40.126.32.68
  • 40.126.32.133
  • 20.190.160.17
  • 20.190.160.20
unknown
go.microsoft.com
  • 184.30.17.189
unknown
nexusrules.officeapps.live.com
  • 52.111.227.11
unknown
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.72
  • 2.16.164.9
unknown
www.microsoft.com
  • 95.101.149.131
  • 23.211.9.92
unknown
client.wns.windows.com
  • 40.113.110.67
unknown
slscr.update.microsoft.com
  • 20.12.23.50
unknown

Threats

No threats detected
No debug info