URL:

https://download.apowersoft.com/down.php?softid=apowermirror

Full analysis: https://app.any.run/tasks/240a48b2-6bd8-4342-8979-28095eab55d5
Verdict: Malicious activity
Analysis date: July 20, 2020, 15:59:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

E4BECAC0C362645C99FA79FE8E6C5292

SHA1:

A58DD344F17753C17F9F795E2503D1A9666B4F35

SHA256:

E6C46946DE4C8D28B5202D74A3EEEEB2395751F482BDBC5DBD690EED72AA26C3

SSDEEP:

3:N8SEl22RLR8CNVd8iJyxXXM:2SK2sR8CNVuiJyW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • apowermirror-setup.exe (PID: 1936)
      • apowermirror-setup.exe (PID: 2372)
      • mDNSResponder.exe (PID: 3248)
      • 7z.exe (PID: 3636)
      • ApowerMirror.exe (PID: 3308)
      • ApowersoftAndroidDaemon.exe (PID: 2128)
    • Changes settings of System certificates

      • msiexec.exe (PID: 2236)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 864)
      • iexplore.exe (PID: 1772)
      • apowermirror-setup.exe (PID: 2372)
      • iexplore.exe (PID: 2904)
      • ApowerMirror.exe (PID: 3308)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2020)
      • iexplore.exe (PID: 2408)
      • installer.exe (PID: 2832)
      • installer.tmp (PID: 2144)
      • msiexec.exe (PID: 2236)
      • ApowerMirror.exe (PID: 3308)
    • Reads Windows owner or organization settings

      • installer.tmp (PID: 2144)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3820)
      • cmd.exe (PID: 2640)
      • installer.tmp (PID: 2144)
    • Reads the Windows organization settings

      • installer.tmp (PID: 2144)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 1556)
      • cmd.exe (PID: 3668)
    • Uses TASKKILL.EXE to kill process

      • installer.tmp (PID: 2144)
    • Creates files in the user directory

      • installer.tmp (PID: 2144)
      • ApowerMirror.exe (PID: 3308)
      • 7z.exe (PID: 3636)
    • Adds / modifies Windows certificates

      • msiexec.exe (PID: 2236)
    • Executed as Windows Service

      • mDNSResponder.exe (PID: 3248)
    • Creates files in the Windows directory

      • msiexec.exe (PID: 2236)
    • Starts Microsoft Installer

      • installer.tmp (PID: 2144)
    • Changes IE settings (feature browser emulation)

      • installer.tmp (PID: 2144)
    • Uses NETSH.EXE for network configuration

      • installer.tmp (PID: 2144)
    • Creates COM task schedule object

      • msiexec.exe (PID: 2236)
    • Starts Internet Explorer

      • apowermirror-setup.exe (PID: 2372)
    • Executed via COM

      • DllHost.exe (PID: 2080)
    • Reads Internet Cache Settings

      • DllHost.exe (PID: 2080)
    • Reads Environment values

      • ApowerMirror.exe (PID: 3308)
    • Reads internet explorer settings

      • ApowerMirror.exe (PID: 3308)
    • Uses NETSTAT.EXE to discover network connections

      • ApowerMirror.exe (PID: 3308)
    • Searches for installed software

      • installer.tmp (PID: 2144)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2020)
      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 2904)
      • iexplore.exe (PID: 1772)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2408)
    • Changes internet zones settings

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 2904)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1772)
      • iexplore.exe (PID: 2904)
      • ApowerMirror.exe (PID: 3308)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1772)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2408)
      • iexplore.exe (PID: 1772)
    • Loads dropped or rewritten executable

      • installer.tmp (PID: 2144)
    • Application was dropped or rewritten from another process

      • installer.tmp (PID: 2144)
    • Creates files in the program directory

      • msiexec.exe (PID: 2236)
      • installer.tmp (PID: 2144)
    • Creates a software uninstall entry

      • installer.tmp (PID: 2144)
      • msiexec.exe (PID: 2236)
    • Application launched itself

      • msiexec.exe (PID: 2236)
      • iexplore.exe (PID: 2904)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1772)
    • Creates files in the user directory

      • iexplore.exe (PID: 1772)
      • iexplore.exe (PID: 2904)
    • Manual execution by user

      • ApowerMirror.exe (PID: 3308)
    • Reads the hosts file

      • ApowerMirror.exe (PID: 3308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
86
Monitored processes
32
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start iexplore.exe iexplore.exe apowermirror-setup.exe no specs apowermirror-setup.exe installer.exe installer.tmp cmd.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs taskkill.exe no specs cmd.exe no specs cmd.exe no specs tasklist.exe no specs find.exe no specs taskkill.exe no specs msiexec.exe no specs msiexec.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs mdnsresponder.exe netsh.exe no specs netsh.exe no specs netsh.exe no specs iexplore.exe WinInetBrokerServer no specs iexplore.exe apowermirror.exe 7z.exe no specs netstat.exe no specs apowersoftandroiddaemon.exe

Process information

PID
CMD
Path
Indicators
Parent process
548"msiexec.exe" /i "C:\Program Files\Apowersoft\ApowerMirror\Bonjour.msi" /quietC:\Windows\system32\msiexec.exeinstaller.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
792netstat.exe -aonC:\Windows\system32\netstat.exeApowerMirror.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Netstat Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netstat.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\iphlpapi.dll
864"C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1556C:\Windows\system32\cmd.exe /c tasklist | find "ApowerMirror.exe" C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1752C:\Windows\system32\MsiExec.exe -Embedding D9DB7103AA524E0538E9A7A4030FDD54C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1772"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2904 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1936"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\apowermirror-setup.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\apowermirror-setup.exeiexplore.exe
User:
admin
Company:
Apowersoft
Integrity Level:
MEDIUM
Description:
Apowersoft Installer
Exit code:
3221226540
Version:
1.1.0.2
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\6z2bcoul\apowermirror-setup.exe
c:\systemroot\system32\ntdll.dll
2020"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2408 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2080C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\imm32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ulib.dll
c:\windows\system32\kernelbase.dll
c:\systemroot\system32\ntdll.dll
c:\windows\system32\dllhost.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
2080find "ApowerMirror.exe" C:\Windows\system32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
3 841
Read events
3 087
Write events
723
Delete events
31

Modification events

(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
3733548732
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30826158
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2408) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
86
Suspicious files
42
Text files
588
Unknown types
24

Dropped files

PID
Process
Filename
Type
2020iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabE74.tmp
MD5:
SHA256:
2020iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarE75.tmp
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFF9880E8E73BC9D6D.TMP
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\apowermirror-setup.exe.hfsxpeh.partial:Zone.Identifier
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF9CCFCC7B51DE1A25.TMP
MD5:
SHA256:
2408iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0A486BD5-CAA2-11EA-A84D-12A9866C77DE}.dat
MD5:
SHA256:
2372apowermirror-setup.exeC:\Users\admin\AppData\Local\Temp\installer.exe
MD5:
SHA256:
2144installer.tmpC:\Program Files\Apowersoft\ApowerMirror\is-VN132.tmp
MD5:
SHA256:
2144installer.tmpC:\Program Files\Apowersoft\ApowerMirror\is-5I3JP.tmp
MD5:
SHA256:
2144installer.tmpC:\Program Files\Apowersoft\ApowerMirror\is-A9T1I.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
64
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&apptype=saas&installer_version=1.1.0.2&is_old_user=-1&last_stepduration=1&os_available_memory=3059828000&os_culture=0409&os_dpi=100&os_fullname=Microsoft%20Windows%207%20Professional%20&os_lang=en-US&os_resolution=1280x720&os_total_memory=3669616000&os_version=6.1.7601&step=1
US
suspicious
2372
apowermirror-setup.exe
GET
302
47.91.201.11:80
http://download.apowersoft.com/down.php?softid=apowermirrorinstall
HK
suspicious
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&installed=1&installed_ts=1595260915&step=2
US
suspicious
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&app_install_path=C%3A%5CProgram%20Files%5CApowersoft%5CApowerMirror&app_lang=English&apptype=saas&last_stepduration=6&step=2
US
suspicious
2372
apowermirror-setup.exe
GET
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/webtrack/track?APIVersion=0.6.0&__topic__=win-launcher&unique_id=e615529a4cd3aafaed2134f189cbbfa2&session_id=1595260798&app=ApowerMirror&ga_error=&ga_ok=0&ga_response=&gaid=&step=2
US
suspicious
2020
iexplore.exe
GET
200
93.184.220.29:80
http://status.rapidssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRhhZrQET0hvbSHUJmNfBKqR%2FiT7wQUU8oXWfxrwAMhLxqu5KqoHIJW2nUCEASHty8Ox3OveE46EN8G65Y%3D
US
der
471 b
shared
1772
iexplore.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3308
ApowerMirror.exe
POST
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/113
US
suspicious
3308
ApowerMirror.exe
POST
200
47.244.67.197:80
http://wx-user-behavior.cn-hongkong.log.aliyuncs.com/logstores/113
US
suspicious
1772
iexplore.exe
GET
200
93.184.220.29:80
http://status.rapidssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRhhZrQET0hvbSHUJmNfBKqR%2FiT7wQUU8oXWfxrwAMhLxqu5KqoHIJW2nUCEAloOPH1KqWNehBhrjwZ9n4%3D
US
der
471 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2020
iexplore.exe
47.91.201.11:443
download.apowersoft.com
Alibaba (China) Technology Co., Ltd.
HK
suspicious
2020
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2020
iexplore.exe
13.225.84.56:443
d31gfrlvpyxnbz.cloudfront.net
US
malicious
2020
iexplore.exe
23.37.43.27:80
s.symcd.com
Akamai Technologies, Inc.
NL
whitelisted
2372
apowermirror-setup.exe
47.91.201.11:80
download.apowersoft.com
Alibaba (China) Technology Co., Ltd.
HK
suspicious
2372
apowermirror-setup.exe
47.244.67.197:80
wx-user-behavior.cn-hongkong.log.aliyuncs.com
US
suspicious
2372
apowermirror-setup.exe
13.225.84.56:443
d31gfrlvpyxnbz.cloudfront.net
US
malicious
2372
apowermirror-setup.exe
13.225.84.100:443
d31gfrlvpyxnbz.cloudfront.net
US
suspicious
1772
iexplore.exe
47.91.201.11:80
download.apowersoft.com
Alibaba (China) Technology Co., Ltd.
HK
suspicious
1772
iexplore.exe
47.252.13.107:443
www.apowersoft.com
Alibaba (China) Technology Co., Ltd.
US
suspicious

DNS requests

Domain
IP
Reputation
download.apowersoft.com
  • 47.91.201.11
suspicious
ocsp.digicert.com
  • 93.184.220.29
whitelisted
status.rapidssl.com
  • 93.184.220.29
shared
d31gfrlvpyxnbz.cloudfront.net
  • 13.225.84.56
  • 13.225.84.100
  • 13.225.84.29
  • 13.225.84.109
whitelisted
s.symcd.com
  • 23.37.43.27
shared
wx-user-behavior.cn-hongkong.log.aliyuncs.com
  • 47.244.67.197
  • 47.244.67.196
  • 47.244.67.195
  • 47.244.67.194
  • 47.244.67.193
  • 47.244.67.192
  • 47.244.67.191
  • 47.90.119.19
  • 47.89.5.161
  • 47.52.212.53
suspicious
download.aoscdn.com
  • 47.91.201.11
suspicious
dns.msftncsi.com
  • 131.107.255.255
shared
r.aoscdn.com
  • 47.91.201.11
suspicious
www.apowersoft.com
  • 47.252.13.107
suspicious

Threats

No threats detected
No debug info