File name:

Winlocker_1807890011.exe

Full analysis: https://app.any.run/tasks/6025c690-c7d5-48cf-9ab2-c5f5b45661b8
Verdict: Malicious activity
Analysis date: March 29, 2026, 14:09:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
dnguard
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

9A375B1FA2F7541128ECCCB52A27D8C8

SHA1:

E2DDC601B01BA6CCBCB01EC9CC5FB490169A8EAE

SHA256:

87DAA528FCE6D5D32DB27BE20BB5034DB1AE0DB494F4486F0A88687B6D28085E

SSDEEP:

1536:e0AejjjVLfMcFvZxTuI5KRLLBP8d+das2g2gN37:e0AejjjGcN/TuaS2ngN37

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 7780)
      • cmd.exe (PID: 4784)
      • cmd.exe (PID: 7672)
      • cmd.exe (PID: 7664)
      • cmd.exe (PID: 6012)
      • cmd.exe (PID: 1268)
      • cmd.exe (PID: 8168)
      • cmd.exe (PID: 3264)
      • cmd.exe (PID: 7740)
      • cmd.exe (PID: 5140)
      • cmd.exe (PID: 4124)
      • cmd.exe (PID: 7008)
      • cmd.exe (PID: 2324)
      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 6912)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 1456)
      • cmd.exe (PID: 7408)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 8076)
      • cmd.exe (PID: 8120)
    • Changes the login/logoff helper path in the registry

      • obf.exe (PID: 7512)
    • Changes the AppInit_DLLs value (autorun option)

      • obf.exe (PID: 7512)
  • SUSPICIOUS

    • Checks for external IP

      • obf.exe (PID: 2728)
      • obf.exe (PID: 7512)
      • xdwdSearch.exe (PID: 996)
    • Starts a Microsoft application from unusual location

      • obf.exe (PID: 7512)
      • obf.exe (PID: 2728)
    • Reads the date of Windows installation

      • obf.exe (PID: 2728)
      • obf.exe (PID: 7512)
    • Application launched itself

      • obf.exe (PID: 2728)
    • Creates scheduled task with highest privileges

      • cmd.exe (PID: 2324)
      • schtasks.exe (PID: 7352)
      • schtasks.exe (PID: 7948)
      • cmd.exe (PID: 7672)
      • schtasks.exe (PID: 1176)
      • cmd.exe (PID: 4784)
      • cmd.exe (PID: 7664)
      • schtasks.exe (PID: 7196)
      • cmd.exe (PID: 6012)
      • schtasks.exe (PID: 7456)
      • cmd.exe (PID: 8168)
      • cmd.exe (PID: 1268)
      • schtasks.exe (PID: 5848)
      • cmd.exe (PID: 3264)
      • schtasks.exe (PID: 7452)
      • cmd.exe (PID: 7740)
      • schtasks.exe (PID: 7760)
      • schtasks.exe (PID: 8088)
      • schtasks.exe (PID: 6936)
      • cmd.exe (PID: 4124)
      • cmd.exe (PID: 7008)
      • cmd.exe (PID: 5140)
      • schtasks.exe (PID: 1304)
      • schtasks.exe (PID: 4240)
      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 7780)
      • schtasks.exe (PID: 5100)
      • schtasks.exe (PID: 4044)
      • cmd.exe (PID: 3120)
      • schtasks.exe (PID: 488)
      • cmd.exe (PID: 6912)
      • schtasks.exe (PID: 684)
      • schtasks.exe (PID: 2220)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 1456)
      • schtasks.exe (PID: 7476)
      • cmd.exe (PID: 7408)
      • schtasks.exe (PID: 3112)
      • cmd.exe (PID: 8120)
      • schtasks.exe (PID: 6872)
      • schtasks.exe (PID: 2032)
      • cmd.exe (PID: 8076)
      • schtasks.exe (PID: 4304)
      • cmd.exe (PID: 7352)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 7780)
      • cmd.exe (PID: 2324)
      • cmd.exe (PID: 7672)
      • cmd.exe (PID: 1268)
      • cmd.exe (PID: 4784)
      • cmd.exe (PID: 7664)
      • cmd.exe (PID: 6012)
      • cmd.exe (PID: 3264)
      • cmd.exe (PID: 7740)
      • cmd.exe (PID: 8168)
      • cmd.exe (PID: 4124)
      • cmd.exe (PID: 7008)
      • cmd.exe (PID: 5140)
      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 6912)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 7408)
      • cmd.exe (PID: 8120)
      • cmd.exe (PID: 1456)
      • cmd.exe (PID: 8076)
    • Executable content was dropped or overwritten

      • obf.exe (PID: 7512)
    • The process executes via Task Scheduler

      • xdwdSearch.exe (PID: 996)
    • Reads browser cookies

      • obf.exe (PID: 7512)
  • INFO

    • Reads the computer name

      • obf.exe (PID: 2728)
      • Winlocker_1807890011.exe (PID: 7704)
      • obf.exe (PID: 7512)
      • xdwdSearch.exe (PID: 996)
    • Detects DNGuard protector (YARA)

      • obf.exe (PID: 2728)
      • obf.exe (PID: 7512)
      • xdwdSearch.exe (PID: 996)
    • Reads the machine GUID from the registry

      • obf.exe (PID: 7512)
      • Winlocker_1807890011.exe (PID: 7704)
      • obf.exe (PID: 2728)
      • xdwdSearch.exe (PID: 996)
    • Disables trace logs

      • obf.exe (PID: 2728)
      • obf.exe (PID: 7512)
      • xdwdSearch.exe (PID: 996)
    • Reads Environment values

      • obf.exe (PID: 2728)
      • obf.exe (PID: 7512)
      • xdwdSearch.exe (PID: 996)
    • Checks supported languages

      • obf.exe (PID: 7512)
      • Winlocker_1807890011.exe (PID: 7704)
      • xdwdSearch.exe (PID: 996)
      • obf.exe (PID: 2728)
    • Reads security settings of Internet Explorer

      • obf.exe (PID: 2728)
      • obf.exe (PID: 7512)
    • Creates files or folders in the user directory

      • obf.exe (PID: 7512)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 2324)
      • cmd.exe (PID: 4784)
      • cmd.exe (PID: 7672)
      • cmd.exe (PID: 1268)
      • cmd.exe (PID: 7664)
      • cmd.exe (PID: 6012)
      • cmd.exe (PID: 8168)
      • cmd.exe (PID: 3264)
      • cmd.exe (PID: 7740)
      • cmd.exe (PID: 5140)
      • cmd.exe (PID: 4124)
      • cmd.exe (PID: 7008)
      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 6912)
      • cmd.exe (PID: 7792)
      • cmd.exe (PID: 1456)
      • cmd.exe (PID: 7408)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 8076)
      • cmd.exe (PID: 8120)
    • Manual execution by a user

      • obf.exe (PID: 2728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (62)
.exe | Win64 Executable (generic) (23.3)
.dll | Win32 Dynamic Link Library (generic) (5.5)
.exe | Win32 Executable (generic) (3.8)
.exe | Win16/32 Executable Delphi generic (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2026:03:29 14:03:26+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware
PEType: PE32
LinkerVersion: 6
CodeSize: 52224
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xebf2
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Winlocker
FileVersion: 1.0.0.0
InternalName: Winlocker.exe
LegalCopyright: Copyright © 2020
LegalTrademarks: -
OriginalFileName: Winlocker.exe
ProductName: Winlocker
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
209
Monitored processes
72
Malicious processes
3
Suspicious processes
22

Behavior graph

Click at the process to see the details
start winlocker_1807890011.exe no specs obf.exe obf.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs xdwdsearch.exe cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
488schtasks /create /f /sc minute /mo 30 /tn "" /tr "C:\WINDOWS\xdwdSearcher.exe" /RL HIGHEST C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
508\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684schtasks /create /f /sc minute /mo 30 /tn "" /tr "C:\WINDOWS\xdwdSearcher.exe" /RL HIGHEST C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
880\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
996"C:\Users\admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdSearch.exe"C:\Users\admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdSearch.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Health Host
Version:
18.4.11612.150
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\inetcookies\xdwdsearch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1176schtasks /create /f /sc minute /mo 30 /tn "" /tr "C:\WINDOWS\xdwdSearcher.exe" /RL HIGHEST C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1268"cmd" /c schtasks /create /f /sc minute /mo 30 /tn "" /tr "C:\WINDOWS\xdwdSearcher.exe" /RL HIGHEST & exitC:\Windows\System32\cmd.exexdwdSearch.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1304schtasks /create /f /sc minute /mo 30 /tn "" /tr "C:\WINDOWS\xdwdSearcher.exe" /RL HIGHEST C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1456"cmd" /c schtasks /create /f /sc minute /mo 30 /tn "" /tr "C:\WINDOWS\xdwdSearcher.exe" /RL HIGHEST & exitC:\Windows\System32\cmd.exexdwdSearch.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1656\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 379
Read events
5 346
Write events
33
Delete events
0

Modification events

(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2728) obf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\obf_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7512obf.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdSearch.exe
MD5:
SHA256:
7512obf.exeC:\Windows\xdwdSearcher.exe
MD5:
SHA256:
7512obf.exeC:\Windows\xdwd.dllexecutable
MD5:16E5A492C9C6AE34C59683BE9C51FA31
SHA256:35C8D022E1D917F1AABDCEAE98097CCC072161B302F84C768CA63E4B32AC2B66
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
43
TCP/UDP connections
38
DNS requests
25
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5276
MoUsoCoreWorker.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
5276
MoUsoCoreWorker.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3094&FlightIds=&UpdateOfferedDays=4294967295&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&sku=48&ActivationChannel=Retail&AttrDataVer=186&IsMDMEnrolled=0&ProcessorCores=6&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&TotalPhysicalRAM=6144&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260281&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&UpdateServiceUrl=http%3A%2F%2Fneverupdatewindows10.com&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
US
whitelisted
GET
200
23.11.41.157:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D
NL
binary
314 b
whitelisted
6844
SIHClient.exe
GET
304
20.165.94.63:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
6844
SIHClient.exe
GET
200
135.232.92.97:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
whitelisted
6844
SIHClient.exe
GET
200
20.165.94.63:443
https://slscr.update.microsoft.com/sls/ping
US
whitelisted
6844
SIHClient.exe
GET
304
20.165.94.63:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
GET
200
204.79.197.203:80
http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D
US
binary
959 b
whitelisted
5316
svchost.exe
POST
400
20.190.160.14:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
6912
svchost.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6912
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
5276
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
48.192.1.64:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5532
SearchApp.exe
92.123.104.12:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
23.11.41.157:80
ocsp.digicert.com
AKAMAI-AMS
NL
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
3428
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5316
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 51.124.78.146
whitelisted
activation-v2.sls.microsoft.com
  • 48.192.1.64
whitelisted
www.bing.com
  • 92.123.104.12
  • 92.123.104.18
  • 92.123.104.14
  • 92.123.104.22
  • 92.123.104.10
  • 92.123.104.20
  • 92.123.104.13
  • 92.123.104.19
  • 92.123.104.66
whitelisted
ocsp.digicert.com
  • 23.11.41.157
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.72
  • 20.190.160.65
  • 20.190.160.5
  • 40.126.32.140
  • 20.190.160.130
  • 40.126.32.76
  • 20.190.160.132
whitelisted
crl.microsoft.com
  • 23.48.23.168
  • 23.48.23.158
  • 23.48.23.162
  • 23.48.23.167
  • 23.48.23.150
  • 23.48.23.173
  • 23.48.23.159
  • 23.48.23.161
  • 23.48.23.153
  • 23.48.23.143
  • 23.48.23.147
  • 23.48.23.140
  • 23.48.23.145
  • 23.48.23.156
  • 23.48.23.141
  • 23.48.23.155
  • 23.48.23.146
whitelisted
www.microsoft.com
  • 23.52.181.212
  • 2.23.246.101
whitelisted

Threats

PID
Process
Class
Message
6912
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2232
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2728
obf.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2728
obf.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
2728
obf.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
2728
obf.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
7512
obf.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
7512
obf.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
7512
obf.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
7512
obf.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
No debug info