File name:

2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit

Full analysis: https://app.any.run/tasks/f207dd2e-55fe-44d2-8052-482a4a6d2e79
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: March 24, 2025, 16:52:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
lockbit
ransomware
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

3DFD85447B58DD8369F27C495E846E98

SHA1:

ED991B92EC7161442C449EDF62B22A3D3CF20C95

SHA256:

D64F55A0EAFC1E08231B95D4CB1F89AA60E7A8F8A6D99F2976D4DDEFB5A94F2D

SSDEEP:

3072:SmhXodguLP/5qUpfDT6zT73g9uMkHUOE8CVSrB85R:yKzAMS8CAr+5

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 4776)
    • RANSOMWARE has been detected

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • [YARA] LockBit is detected

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • Steals credentials from Web Browsers

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • Actions looks like stealing of personal data

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • Renames files like ransomware

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 2108)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
  • INFO

    • Reads the machine GUID from the registry

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 4784)
      • SearchApp.exe (PID: 6660)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 4776)
    • Reads the computer name

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 4784)
      • ShellExperienceHost.exe (PID: 2108)
      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
      • SearchApp.exe (PID: 6660)
    • Checks supported languages

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 4784)
      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
      • ShellExperienceHost.exe (PID: 2108)
      • SearchApp.exe (PID: 6660)
    • Creates files in the program directory

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • Manual execution by a user

      • notepad.exe (PID: 4628)
      • OpenWith.exe (PID: 6404)
      • OpenWith.exe (PID: 5072)
      • OpenWith.exe (PID: 3020)
      • OpenWith.exe (PID: 6572)
      • OpenWith.exe (PID: 456)
      • wscript.exe (PID: 2404)
      • OpenWith.exe (PID: 4380)
      • wscript.exe (PID: 6480)
    • Creates files or folders in the user directory

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 5072)
      • OpenWith.exe (PID: 6572)
      • OpenWith.exe (PID: 3020)
      • OpenWith.exe (PID: 456)
      • OpenWith.exe (PID: 4380)
      • OpenWith.exe (PID: 6404)
    • Create files in a temporary directory

      • 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe (PID: 1512)
    • Checks proxy server information

      • SearchApp.exe (PID: 6660)
    • Reads the software policy settings

      • SearchApp.exe (PID: 6660)
    • Process checks computer location settings

      • SearchApp.exe (PID: 6660)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.2)
.exe | Win16/32 Executable Delphi generic (12)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:09:09 01:27:01+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.12
CodeSize: 99328
InitializedDataSize: 50688
UninitializedDataSize: -
EntryPoint: 0x1946f
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
14
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe no specs CMSTPLUA #LOCKBIT 2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe shellexperiencehost.exe no specs notepad.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs wscript.exe no specs wscript.exe no specs openwith.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
456"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\operationsbeginning.jpg.aBKVixsiMC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1512"C:\Users\admin\Desktop\2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe" C:\Users\admin\Desktop\2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe
dllhost.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\gdi32.dll
c:\windows\syswow64\win32u.dll
2108"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
2404"C:\Windows\System32\WScript.exe" C:\Users\admin\Desktop\background.jsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
1
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3020"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\bringwall.jpg.aBKVixsiMC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4380"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Desktop\manifest.jsonC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4628"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Downloads\aBKVixsiM.README.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4776C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
4784"C:\Users\admin\Desktop\2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe" C:\Users\admin\Desktop\2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
5072"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\boyscustom.png.aBKVixsiMC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
2147943623
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
11 161
Read events
11 106
Write events
54
Delete events
1

Modification events

(PID) Process:(4776) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2108) ShellExperienceHost.exeKey:\REGISTRY\A\{4d4642ac-28c5-fc95-4165-b6249677214f}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D000000F825A02FDD9CDB01
(PID) Process:(6404) OpenWith.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aBKVixsiM\OpenWithProgids
Operation:writeName:aBKVixsiM
Value:
(PID) Process:(5072) OpenWith.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aBKVixsiM\OpenWithProgids
Operation:writeName:aBKVixsiM
Value:
(PID) Process:(6572) OpenWith.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aBKVixsiM\OpenWithProgids
Operation:writeName:aBKVixsiM
Value:
(PID) Process:(3020) OpenWith.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aBKVixsiM\OpenWithProgids
Operation:writeName:aBKVixsiM
Value:
(PID) Process:(456) OpenWith.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aBKVixsiM\OpenWithProgids
Operation:writeName:aBKVixsiM
Value:
(PID) Process:(6660) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:SafeSearchMode
Value:
1
(PID) Process:(6660) SearchApp.exeKey:\REGISTRY\A\{98a1ed5b-dd81-869b-b290-5f8c70aa1ea0}\LocalState
Operation:writeName:BINGIDENTITY_PROP_USEREMAIL
Value:
0000187DA377DD9CDB01
(PID) Process:(6660) SearchApp.exeKey:\REGISTRY\A\{98a1ed5b-dd81-869b-b290-5f8c70aa1ea0}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPETEXT
Value:
0000FEE2A677DD9CDB01
Executable files
13
Suspicious files
1 487
Text files
1 638
Unknown types
0

Dropped files

PID
Process
Filename
Type
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\IIIIIIIIIIIbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\FFFFFFFFFFFbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\BBBBBBBBBBBbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\GGGGGGGGGGGbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\AAAAAAAAAAAbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\NNNNNNNNNNNbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\JJJJJJJJJJJbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\KKKKKKKKKKKbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\PPPPPPPPPPPbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
15122025-03-24_3dfd85447b58dd8369f27c495e846e98_darkside_lockbit.exeC:\$Recycle.Bin\S-1-5-18\RRRRRRRRRRRbinary
MD5:350EB1DA59F2BE1A1119F36B1023C738
SHA256:8DF95694F22989F9AC5DFC4FA3C4ABDBB1118F18B4617B872B5105D845F73D22
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
22
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
204
2.23.227.208:443
https://www.bing.com/threshold/xls.aspx
unknown
whitelisted
GET
200
2.23.227.208:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
3.46 Kb
whitelisted
GET
200
2.23.227.208:443
https://www.bing.com/rb/6i/ortl,cc,nc/QNBBNqWD9F_Blep-UqQSqnMp-FI.css?bu=AcoK&or=w
unknown
text
6 b
whitelisted
GET
200
2.23.227.215:443
https://www.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=DyIrb3t-gQF4cnWyAbUBK6UBK7gB&or=w
unknown
binary
21.3 Kb
whitelisted
GET
200
2.23.227.215:443
https://www.bing.com/rb/16/jnc,nj/pNXV2ymlrFEAOVLUgJkRBRwYFkY.js?bu=Diozf4wBkwGWAYkBggGGAcQBxwEzuwHKAQ&or=w
unknown
binary
21.7 Kb
whitelisted
GET
200
2.23.227.215:443
https://www.bing.com/rb/19/cir3,ortl,cc,nc/vOJNaIfAXvJzmnBm845ss-M9YR8.css?bu=B4QDRvEC1gFkZI8D&or=w
unknown
text
5.97 Kb
whitelisted
GET
200
2.23.227.208:443
https://www.bing.com/rp/-iNIzuEypRdgRJ6xnyVHizZ3bpM.br.js
unknown
binary
17.0 Kb
whitelisted
GET
200
2.23.227.215:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
unknown
html
127 Kb
whitelisted
GET
200
2.23.227.208:443
https://www.bing.com/rb/19/cir3,ortl,cc,nc/FgBbpIj0thGWZOh_xFnM9i4O7ek.css?bu=C_QJ-AOrBcoKrgmYCbcHZGRkZA&or=w
unknown
text
19.8 Kb
whitelisted
GET
200
2.23.227.215:443
https://www.bing.com/rp/0u2b9EXo8LdXut1MFm4AD0phBuM.br.js
unknown
binary
1.44 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6660
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted

Threats

No threats detected
No debug info