File name:

{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe

Full analysis: https://app.any.run/tasks/1ef59463-d216-4528-9a67-6bcf7ff677ae
Verdict: Malicious activity
Threats:

LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.

Analysis date: May 16, 2025, 20:04:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
lockbit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

4A780F7ADCB283FF07A6948E65706146

SHA1:

C64CDB776AF4E497E78F9BDA946B0CC245F27E10

SHA256:

02B10B81A4177F1C4EA710AB567F85E0FE255A2134C0CE3F9B4F2B73E39FB755

SSDEEP:

12288:pBKY4GZQni/exQu/MWpi7to4zXVFVcIVlVop:TVZKi/exN/B

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 904)
    • [YARA] LockBit is detected

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • RANSOMWARE has been detected

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Renames files like ransomware

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
  • SUSPICIOUS

    • Write to the desktop.ini file (may be used to cloak folders)

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6404)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 1180)
    • Changes the desktop background image

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Starts application with an unusual extension

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Executable content was dropped or overwritten

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Executes application which crashes

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
  • INFO

    • Checks supported languages

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 6640)
      • ShellExperienceHost.exe (PID: 1180)
      • 3FA6.tmp (PID: 7820)
    • Reads the machine GUID from the registry

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 6640)
      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Reads the computer name

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 6640)
      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
      • ShellExperienceHost.exe (PID: 1180)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 904)
      • notepad.exe (PID: 7980)
    • Creates files in the program directory

      • {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe (PID: 2284)
    • Manual execution by a user

      • notepad.exe (PID: 7980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (46.3)
.exe | Win64 Executable (generic) (41)
.exe | Win32 Executable (generic) (6.6)
.exe | Generic Win/DOS Executable (2.9)
.exe | DOS Executable Generic (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:12:04 16:11:35+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 45568
InitializedDataSize: 28910080
UninitializedDataSize: -
EntryPoint: 0x212a
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 84.0.0.0
ProductVersionNumber: 93.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Patched, Private build, Special build
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
10
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe no specs CMSTPLUA THREAT {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe sppextcomobj.exe no specs slui.exe no specs shellexperiencehost.exe no specs vssvc.exe no specs 3fa6.tmp no specs werfault.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
1180"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
2152"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2284"C:\Users\admin\AppData\Local\Temp\{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe" C:\Users\admin\AppData\Local\Temp\{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe
dllhost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msimg32.dll
c:\windows\syswow64\gdi32.dll
5048C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6404C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6640"C:\Users\admin\AppData\Local\Temp\{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe" C:\Users\admin\AppData\Local\Temp\{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msimg32.dll
7820"C:\ProgramData\3FA6.tmp"C:\ProgramData\3FA6.tmp{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\programdata\3fa6.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
7904C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2284 -s 1084C:\Windows\SysWOW64\WerFault.exe{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7980"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\6IFfhp1ms.README.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
6 421
Read events
3 995
Write events
2 425
Delete events
1

Modification events

(PID) Process:(904) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(1180) ShellExperienceHost.exeKey:\REGISTRY\A\{d9ac94df-0217-4ce1-a70b-1f9b0534d901}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D000000D5889CB39DC6DB01
(PID) Process:(1180) ShellExperienceHost.exeKey:\REGISTRY\A\{d9ac94df-0217-4ce1-a70b-1f9b0534d901}\LocalState
Operation:writeName:PeekBadges
Value:
5B005D0000004BD79CB39DC6DB01
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\AirSpaceChannel
Operation:writeName:Enabled
Value:
0
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\AirSpaceChannel
Operation:writeName:ChannelAccess
Value:
O:BAG:SYD:(A;;0x1;;;SY)(A;;0x5;;;BA)(A;;0x1;;;LA)
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Analytic
Operation:writeName:Enabled
Value:
0
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Analytic
Operation:writeName:ChannelAccess
Value:
O:BAG:SYD:(A;;0x1;;;SY)(A;;0x5;;;BA)(A;;0x1;;;LA)
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\DirectShowFilterGraph
Operation:writeName:Enabled
Value:
0
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\DirectShowFilterGraph
Operation:writeName:ChannelAccess
Value:
O:BAG:SYD:(A;;0x1;;;SY)(A;;0x5;;;BA)(A;;0x1;;;LA)
(PID) Process:(2284) {{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\FirstUXPerf-Analytic
Operation:writeName:Enabled
Value:
0
Executable files
2
Suspicious files
198
Text files
87
Unknown types
0

Dropped files

PID
Process
Filename
Type
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\BBBBBBBBBBBbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\desktop.inibinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\EEEEEEEEEEEbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\ProgramData\6IFfhp1ms.icoimage
MD5:88D9337C4C9CFE2D9AFF8A2C718EC76B
SHA256:95E059EF72686460884B9AEA5C292C22917F75D56FE737D43BE440F82034F438
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\DDDDDDDDDDDbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\JJJJJJJJJJJbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\MMMMMMMMMMMbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\PPPPPPPPPPPbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\OOOOOOOOOOObinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
2284{{{{{{입_사_지_원_서 240527)))))) 모든것에 최선을 다하겠습니다.exeC:\$Recycle.Bin\S-1-5-18\NNNNNNNNNNNbinary
MD5:E47B2FB7F948E41BDFF77D4C80E435F5
SHA256:551B8576BFD02B5A730509797C2C210553914BB4463CE38007F1CC05BC0AE8DE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.184:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7708
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7708
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.184:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7708
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.184
  • 23.48.23.183
  • 23.48.23.192
  • 23.48.23.175
  • 23.48.23.190
  • 23.48.23.194
  • 23.48.23.173
  • 23.48.23.195
  • 23.48.23.185
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.130
  • 40.126.31.129
  • 40.126.31.3
  • 20.190.159.0
  • 20.190.159.64
  • 20.190.159.2
  • 20.190.159.23
  • 40.126.31.131
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info