Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
612s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 08:27 UTC
Behavioral task
behavioral1
Sample
lasservices_spoofer.exe
Resource
win7-20240221-en
General
-
Target
lasservices_spoofer.exe
-
Size
11.0MB
-
MD5
09bbb184c9a6e587b0f40492723e604f
-
SHA1
4bbcfa112b1cf36b138d463a7e6a99fbe94754eb
-
SHA256
6235dcfcc025b267404345ac9cbab036edd2e17b7f1c3009374042204d380b21
-
SHA512
906402ea905c08ce33690ce6d8b04e20ba50537ccd66e5422a27b1899960d2501ac693d5d06045bb68fd755f5c454ea8d319042f5383cc579e113c541e405317
-
SSDEEP
196608:JGluENPKd3fjqfnHzW2JmMf8PzHm1ufh6Bffpf5YUAyQ:Ml5RKJqPaMQa1ufh6BZyUAN
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lasservices_spoofer.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions lasservices_spoofer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lasservices_spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lasservices_spoofer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5060-10-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-11-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-12-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-13-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-14-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-16-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-18-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-19-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-20-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-22-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-24-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-26-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-27-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-28-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-29-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-30-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-31-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-32-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-33-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-37-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-48-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-49-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-50-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-51-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-53-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-54-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-55-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-56-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-57-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-58-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-59-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-60-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-61-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-62-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-63-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-64-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-65-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-66-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-67-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-68-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-69-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-70-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-71-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-72-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-73-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-74-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-75-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-76-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-77-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-78-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida behavioral2/memory/5060-79-0x00007FF72B970000-0x00007FF72D503000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lasservices_spoofer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN lasservices_spoofer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe 5060 lasservices_spoofer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5060 lasservices_spoofer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5060 wrote to memory of 2476 5060 lasservices_spoofer.exe 90 PID 5060 wrote to memory of 2476 5060 lasservices_spoofer.exe 90 PID 2476 wrote to memory of 2464 2476 cmd.exe 91 PID 2476 wrote to memory of 2464 2476 cmd.exe 91 PID 2476 wrote to memory of 1008 2476 cmd.exe 92 PID 2476 wrote to memory of 1008 2476 cmd.exe 92 PID 2476 wrote to memory of 4092 2476 cmd.exe 93 PID 2476 wrote to memory of 4092 2476 cmd.exe 93 PID 5060 wrote to memory of 2060 5060 lasservices_spoofer.exe 94 PID 5060 wrote to memory of 2060 5060 lasservices_spoofer.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe"C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe" MD53⤵PID:2464
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1008
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe"C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe"2⤵PID:2060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵PID:4164
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\lasservices_spoofer.exe" MD53⤵PID:4160
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4992
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4780
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:2392
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:652
Network
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestkeyauth.winIN AResponsekeyauth.winIN A104.26.0.5keyauth.winIN A104.26.1.5keyauth.winIN A172.67.72.57
-
Remote address:104.26.0.5:443RequestPOST /api/1.2/ HTTP/1.1
Host: keyauth.win
Accept: */*
Content-Length: 108
Content-Type: application/x-www-form-urlencoded
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=UTF-8
Content-Length: 411
Connection: keep-alive
signature: 9899830c0c4b7158235c69f85a43e9efa8b6d73219ceed7d33a0de82588991ac
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kh3907%2B7JJxq61fCzyQu0eGd4POL1RG0aObuaAYLKWkp29SzjxdpB0tgXopgRlPrAYTCd5mwLdVn7i68IbZO8Ka4Zb3I2%2BPragfkPEBeVuHJq1g2%2FFQAlsi7rbXr"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Acknowledge: Credit to VaultCord.com
X-Powered-By: VaultCord.com
content-security-policy: upgrade-insecure-requests
permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
referrer-policy: strict-origin-when-cross-origin
strict-transport-security: max-age=31536000; includeSubDomains
x-content-security-policy: img-src *; media-src * data:;
x-content-type-options: nosniff
x-frame-options: DENY
x-xss-protection: 1; mode=block
Access-Control-Allow-Headers: *
Access-Control-Allow-Methods: *
Access-Control-Allow-Origin: *
Server: cloudflare
CF-RAY: 85a65569e8d56325-LHR
-
Remote address:8.8.8.8:53Requestx2.c.lencr.orgIN AResponsex2.c.lencr.orgIN CNAMEcrl.root-x1.letsencrypt.org.edgekey.netcrl.root-x1.letsencrypt.org.edgekey.netIN CNAMEe8652.dscx.akamaiedge.nete8652.dscx.akamaiedge.netIN A2.19.169.32
-
Remote address:2.19.169.32:80RequestGET / HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: x2.c.lencr.org
ResponseHTTP/1.1 200 OK
Content-Type: application/pkix-crl
Last-Modified: Mon, 12 Feb 2024 22:07:27 GMT
ETag: "65ca969f-12b"
Cache-Control: max-age=3600
Expires: Sat, 24 Feb 2024 09:28:11 GMT
Date: Sat, 24 Feb 2024 08:28:11 GMT
Content-Length: 299
Connection: keep-alive
-
Remote address:8.8.8.8:53Request5.0.26.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request32.169.19.2.in-addr.arpaIN PTRResponse32.169.19.2.in-addr.arpaIN PTRa2-19-169-32deploystaticakamaitechnologiescom
-
Remote address:104.26.0.5:443RequestPOST /api/1.2/ HTTP/1.1
Host: keyauth.win
Accept: */*
Content-Length: 123
Content-Type: application/x-www-form-urlencoded
ResponseHTTP/1.1 200 OK
Content-Type: application/json; charset=UTF-8
Content-Length: 344
Connection: keep-alive
signature: 379dec924c1f715b76775d5429bad50ef5cee6dc0373a4d402af23b7184c5d6b
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=mUe1bbyaZ71WP1IQqkpErFAt0QtN4iHo8jO%2BYHDWA6%2FU8sFYE7fXivEqR2uTx5WGcb2dspDLvthWuuZV9wRMqSWfJbZ%2FHtk1fgKr1SLdcD4IzteqxplGUsoXcH6D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Acknowledge: Credit to VaultCord.com
X-Powered-By: VaultCord.com
content-security-policy: upgrade-insecure-requests
permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
referrer-policy: strict-origin-when-cross-origin
strict-transport-security: max-age=31536000; includeSubDomains
x-content-security-policy: img-src *; media-src * data:;
x-content-type-options: nosniff
x-frame-options: DENY
x-xss-protection: 1; mode=block
Access-Control-Allow-Headers: *
Access-Control-Allow-Methods: *
Access-Control-Allow-Origin: *
Server: cloudflare
CF-RAY: 85a6556d1b0d6536-LHR
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request209.178.17.96.in-addr.arpaIN PTRResponse209.178.17.96.in-addr.arpaIN PTRa96-17-178-209deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcxcs.microsoft.netIN AResponsecxcs.microsoft.netIN CNAMEcxcs.microsoft.net.edgekey.netcxcs.microsoft.net.edgekey.netIN CNAMEe3230.b.akamaiedge.nete3230.b.akamaiedge.netIN A23.214.133.66
-
52 B 1
-
-
-
989 B 7.2kB 10 13
HTTP Request
POST https://keyauth.win/api/1.2/HTTP Response
200 -
443 B 812 B 7 5
HTTP Request
GET http://x2.c.lencr.org/HTTP Response
200 -
1.0kB 7.1kB 10 13
HTTP Request
POST https://keyauth.win/api/1.2/HTTP Response
200 -
-
-
944 B 6.8kB 9 12
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
57 B 105 B 1 1
DNS Request
keyauth.win
DNS Response
104.26.0.5104.26.1.5172.67.72.57
-
60 B 165 B 1 1
DNS Request
x2.c.lencr.org
DNS Response
2.19.169.32
-
69 B 131 B 1 1
DNS Request
5.0.26.104.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
32.169.19.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
209.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
64 B 154 B 1 1
DNS Request
cxcs.microsoft.net
DNS Response
23.214.133.66