File name:

G0874 RDWorksV8Setup8.01.31-180607.exe

Full analysis: https://app.any.run/tasks/7769e0a2-f04d-4e2e-9099-a868940586ff
Verdict: Malicious activity
Analysis date: January 21, 2025, 15:03:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

43375C9A0556412DA4A4B8E8549579F3

SHA1:

0E0D3D9E0B779DD4382D2F08612C6691B10DAD67

SHA256:

0F26EDDDC1155F5DF0CDB1590976F58204C915479E47A9A5842463D7C8B72B5B

SSDEEP:

98304:B+fgEyE1HyE0FvGmTwZiHD8/bj1G4i8nzPAzB4HDNBU1icDIXXhn5WylGllNQdc7:rGiSu8dp+VVoB6gS5nr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
      • RDWorksSetUpV8.exe (PID: 7056)
    • Executable content was dropped or overwritten

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
      • RDWorksSetUpV8.exe (PID: 7056)
    • There is functionality for taking screenshot (YARA)

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • Drops a system driver (possible attempt to evade defenses)

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • Creates a software uninstall entry

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • Reads security settings of Internet Explorer

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • Starts CMD.EXE for commands execution

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • Creates file in the systems drive root

      • RDWorksSetUpV8.exe (PID: 7056)
  • INFO

    • Reads the computer name

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
      • RDWorksSetUpV8.exe (PID: 7056)
    • The sample compiled with english language support

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
      • RDWorksSetUpV8.exe (PID: 7056)
    • Checks supported languages

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
      • RDWorksSetUpV8.exe (PID: 7056)
    • The sample compiled with arabic language support

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • The sample compiled with chinese language support

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
      • RDWorksSetUpV8.exe (PID: 7056)
    • Process checks computer location settings

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • The process uses the downloaded file

      • G0874 RDWorksV8Setup8.01.31-180607.exe (PID: 6564)
    • Manual execution by a user

      • RDWorksV8.exe (PID: 6768)
      • RDWorksV8.exe (PID: 6692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (31.9)
.scr | Windows screen saver (29.4)
.dll | Win32 Dynamic Link Library (generic) (14.8)
.exe | Win32 Executable (generic) (10.1)
.exe | Win16/32 Executable Delphi generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 148992
InitializedDataSize: 41984
UninitializedDataSize: -
EntryPoint: 0x25468
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.1.31.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: -
CompanyName: None
FileDescription: RDWorks 8.01.31 Installation
FileVersion: 8.01.31
LegalCopyright: None
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
218
Monitored processes
87
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start g0874 rdworksv8setup8.01.31-180607.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs rdworkssetupv8.exe cmd.exe no specs conhost.exe no specs rdworksv8.exe no specs rdworksv8.exe g0874 rdworksv8setup8.01.31-180607.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
372\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
440\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
440"C:\Windows\System32\cmd.exe" "/c copy Lang\LGP_chs.ini c:\newpr\com\LGP_chs.ini"C:\Windows\SysWOW64\cmd.exeG0874 RDWorksV8Setup8.01.31-180607.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
536\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
836\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1556"C:\Windows\System32\cmd.exe" "/c copy Lang\Lang_cht.ini c:\newpr\laserwork\Lang_cht.ini"C:\Windows\SysWOW64\cmd.exeG0874 RDWorksV8Setup8.01.31-180607.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2076"C:\Windows\System32\cmd.exe" "/c copy Lang\Preview_cht.ini c:\newpr\com\Preview_cht.ini"C:\Windows\SysWOW64\cmd.exeG0874 RDWorksV8Setup8.01.31-180607.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2408"C:\Windows\System32\cmd.exe" "/c copy Lang\Lang_eng.ini c:\newpr\laserwork\Lang_eng.ini"C:\Windows\SysWOW64\cmd.exeG0874 RDWorksV8Setup8.01.31-180607.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2828\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3172\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
3 267
Read events
3 249
Write events
18
Delete events
0

Modification events

(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:DisplayName
Value:
RDWorks 8.01.31
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:DisplayVersion
Value:
8.01.31
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:VersionMajor
Value:
8
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:VersionMinor
Value:
1
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:Publisher
Value:
None
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:DisplayIcon
Value:
C:\newpr\Uninstall.exe
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:UninstallString
Value:
C:\newpr\Uninstall.exe
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:InstallLocation
Value:
C:\newpr\
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:NoModify
Value:
1
(PID) Process:(6564) G0874 RDWorksV8Setup8.01.31-180607.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\RDWorks 8.01.31
Operation:writeName:NoRepair
Value:
1
Executable files
130
Suspicious files
135
Text files
119
Unknown types
0

Dropped files

PID
Process
Filename
Type
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\Users\admin\AppData\Local\Temp\$inst\temp_0.tmp
MD5:
SHA256:
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\ftdiport.catbinary
MD5:70CDA61115376F5ACA40565191DBEB95
SHA256:B41D6B213FD4CEDE6FCA34966484047B21E74BCC84EA87A0D39B47691269B06B
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\Users\admin\AppData\Local\Temp\$inst\2.tmpcompressed
MD5:8708699D2C73BED30A0A08D80F96D6D7
SHA256:A32E0A83001D2C5D41649063217923DAC167809CAB50EC5784078E41C9EC0F0F
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\dpinst.xmlxml
MD5:E8DA2059C139D3D4CB8A9520EC594DAA
SHA256:7FCD043C4E8B5AAC218CEB659D5BACBCA46B5FA671D33DDD2E4B44C2D5B3DEDD
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\ftdibus.infbinary
MD5:173021424249F1152409212F3A4B984D
SHA256:AB82ADA7FF2F3030B87352DD5040025938CCBC9F365C8319A5356DD8984C79C4
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\ftdiport.infbinary
MD5:CED7C59D76F7FF617A8A18822383A4A2
SHA256:FDE3A9ECE07F82FB9AA252E77728F159A037EF8DF519CC039D5C7D6894DBAFD3
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\ftd2xx.htext
MD5:F8A1E29135D11D97B428AC2EAA96E649
SHA256:20ABFF3908C202C78F1CAC05CFC0900D5DA12A8CBA0EA54B2B7DFA5BE678A493
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\amd64\ftser2k.sysexecutable
MD5:D35D8310AA13DC851EC2319D1640A17B
SHA256:300E1D23C113C8A5BACC07552FA62E5F14257C8593D575A7FB4C5A879B850F5F
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\amd64\ftlang.dllexecutable
MD5:F4446E14847F77B78093E5565D9FEC96
SHA256:2396899E9B50D5A9A3747CED671F1E7070BB9B4D9A71967A024F7CFB1B7D3D22
6564G0874 RDWorksV8Setup8.01.31-180607.exeC:\newpr\driver\amd64\ftd2xx.libbinary
MD5:1084A116C33DCA7FCCEF1BE407CAA11E
SHA256:4472B5F53CF13E3D7DE4E8F568B040ED2D9A5F359870FBF94C68A25023E84E8E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.113:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1792
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1792
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3208
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.23.242.9:443
go.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
1076
svchost.exe
2.23.242.9:443
go.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.113:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.138
  • 20.190.160.14
  • 40.126.32.140
  • 20.190.160.17
  • 20.190.160.20
  • 40.126.32.133
  • 40.126.32.74
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.113
  • 2.16.164.112
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info