File name:

Hardlock.exe

Full analysis: https://app.any.run/tasks/44d2c479-c7cd-45c6-8c3d-103daf816146
Verdict: Malicious activity
Analysis date: January 15, 2026, 09:56:47
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
netreactor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

4D418753485E095B240DFCF77A2BB4C5

SHA1:

026C5521CD8FDA34848831E4F278AF40691D4DA0

SHA256:

47F62D735A960B4AC7F0FB86FC207EF49E4D7ADE97B2B33D6FCE8AD1F9452D43

SSDEEP:

98304:fsI9C0++tJ+nfzOlw4NArZw782rqory9wjGF0bPNlV8EgqeYhGyINGNgl6EMULdR:5Zy2pQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 7cnxn3Mjj033wXX.exe (PID: 7888)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
    • Reads security settings of Internet Explorer

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
    • Application launched itself

      • Hardlock.exe (PID: 7504)
    • Checks for external IP

      • svchost.exe (PID: 2292)
      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
    • Executable content was dropped or overwritten

      • 7cnxn3Mjj033wXX.exe (PID: 7888)
      • Hardlock.exe (PID: 7792)
  • INFO

    • Reads the computer name

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
      • 7cnxn3Mjj033wXX.exe (PID: 7888)
    • Reads Environment values

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
    • Disables trace logs

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
    • Reads the machine GUID from the registry

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
      • 7cnxn3Mjj033wXX.exe (PID: 7888)
    • Checks proxy server information

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
      • slui.exe (PID: 2460)
    • Checks supported languages

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
      • 7cnxn3Mjj033wXX.exe (PID: 7888)
    • Process checks computer location settings

      • Hardlock.exe (PID: 7504)
      • Hardlock.exe (PID: 7792)
    • Creates files in the program directory

      • 7cnxn3Mjj033wXX.exe (PID: 7888)
    • .NET Reactor protector has been detected

      • 7cnxn3Mjj033wXX.exe (PID: 7888)
    • Launching a file from a Registry key

      • 7cnxn3Mjj033wXX.exe (PID: 7888)
    • Create files in a temporary directory

      • Hardlock.exe (PID: 7792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2026:01:08 20:54:56+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 2007552
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x1ec01e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: Hardlock.exe
LegalCopyright:
OriginalFileName: Hardlock.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
156
Monitored processes
12
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start hardlock.exe hardlock.exe svchost.exe 7cnxn3mjj033wxx.exe hardlockfree.exe no specs conhost.exe no specs jsc.exe no specs jsc.exe no specs jsc.exe no specs jsc.exe no specs jsc.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2292C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2460C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4212"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe7cnxn3Mjj033wXX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
jsc.exe
Exit code:
4294967295
Version:
14.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\jsc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4540"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe7cnxn3Mjj033wXX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
jsc.exe
Exit code:
4294967295
Version:
14.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\jsc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6020"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe7cnxn3Mjj033wXX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
jsc.exe
Exit code:
4294967295
Version:
14.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\jsc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6548"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe7cnxn3Mjj033wXX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
jsc.exe
Exit code:
4294967295
Version:
14.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\jsc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7464"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe7cnxn3Mjj033wXX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
jsc.exe
Exit code:
4294967295
Version:
14.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\jsc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7504"C:\Users\admin\AppData\Local\Temp\Hardlock.exe" C:\Users\admin\AppData\Local\Temp\Hardlock.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\hardlock.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7792"C:\Users\admin\AppData\Local\Temp\Hardlock.exe" C:\Users\admin\AppData\Local\Temp\Hardlock.exe
Hardlock.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\hardlock.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7888"C:\Users\admin\AppData\Local\Temp\7cnxn3Mjj033wXX.exe" C:\Users\admin\AppData\Local\Temp\7cnxn3Mjj033wXX.exe
Hardlock.exe
User:
admin
Integrity Level:
HIGH
Description:
XBinderOutput.exe
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\7cnxn3mjj033wxx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
6 424
Read events
6 409
Write events
15
Delete events
0

Modification events

(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7504) Hardlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Hardlock_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
3
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7792Hardlock.exeC:\Users\admin\AppData\Local\Temp\HardLockfree.exeexecutable
MD5:F0F61D8B3AAF38C9F26C989F28D5C8E2
SHA256:186514F023DD841B5738F3BC56D444241EBCB4A2911D9FED06C294734E6FD2AC
78887cnxn3Mjj033wXX.exeC:\ProgramData\7cnxn3Mjj033wXX.exeexecutable
MD5:C654B80B3894F33CBB054516DE1AAD84
SHA256:637276DE946E1100BDD852C70F917BC24A6801D6FBC66282CDBECCF8E6EFF02E
7792Hardlock.exeC:\Users\admin\AppData\Local\Temp\7cnxn3Mjj033wXX.exeexecutable
MD5:C654B80B3894F33CBB054516DE1AAD84
SHA256:637276DE946E1100BDD852C70F917BC24A6801D6FBC66282CDBECCF8E6EFF02E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
30
DNS requests
19
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
unknown
whitelisted
6768
MoUsoCoreWorker.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
unknown
whitelisted
7504
Hardlock.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
unknown
936
svchost.exe
POST
200
40.126.31.67:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/FlightSettings/FSService?ProcessorClockSpeed=3094&IsRetailOS=1&OEMManufacturerName=DELL&FlightingPolicyValue=3&EnablePreviewBuilds=4294967295&OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&ManagePreviewBuilds=3&BranchReadinessLevelSource=0&AttrDataVer=186&ProcessorCores=6&BranchReadinessLevelRaw=16&TotalPhysicalRAM=6144&TPMVersion=0&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&DeviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&App=FSS&AppVer=10.0&SmartActiveHoursState=1&ActiveHoursStart=20&SecureBootCapable=0&ActiveHoursEnd=13&DeviceFamily=Windows.Desktop
unknown
text
87.3 Kb
whitelisted
6892
svchost.exe
GET
200
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=562&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
unknown
text
1.43 Kb
whitelisted
7292
SIHClient.exe
GET
200
40.69.42.241:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
whitelisted
7292
SIHClient.exe
GET
200
135.232.92.137:443
https://slscr.update.microsoft.com/sls/ping
unknown
whitelisted
7292
SIHClient.exe
GET
304
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
whitelisted
936
svchost.exe
POST
200
40.126.31.67:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
6892
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1952
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
3412
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7504
Hardlock.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
7792
Hardlock.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
936
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
936
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.142
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.0
  • 40.126.31.3
  • 40.126.31.71
  • 40.126.31.73
  • 20.190.159.23
  • 20.190.159.2
  • 40.126.31.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 2.16.241.14
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 23.59.18.102
whitelisted
slscr.update.microsoft.com
  • 135.232.92.137
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
7504
Hardlock.exe
A Network Trojan was detected
ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com
2292
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
7504
Hardlock.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2292
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
7792
Hardlock.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info