File name:

WhyNotWin11.exe

Full analysis: https://app.any.run/tasks/ea8af163-f3bc-41c0-b83f-e295adf15eb4
Verdict: Malicious activity
Analysis date: April 28, 2025, 14:27:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

72D3C67B35EB043B9C7672646581E3A4

SHA1:

C07DFA503C5289B4ECD57C6C5DCEFFA7D56DFBB4

SHA256:

A4085438C37CDD1B3356A142CF3D8D12B9EEBB9F5AF10A6F5ACA20FFE290A5F7

SSDEEP:

49152:tE/XUraxm5O9QMal0QRO8tkIKXQxKCU9L0zXbWG/NfZHCq7G++YH8+O:t9rem5OidokKNLEK4fZHY++8O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Detected use of alternative data streams (AltDS)

      • WhyNotWin11.exe (PID: 976)
    • There is functionality for taking screenshot (YARA)

      • WhyNotWin11.exe (PID: 976)
  • INFO

    • Checks supported languages

      • WhyNotWin11.exe (PID: 976)
    • The sample compiled with english language support

      • WhyNotWin11.exe (PID: 976)
    • Creates files or folders in the user directory

      • WhyNotWin11.exe (PID: 976)
      • dxdiag.exe (PID: 1280)
    • Reads mouse settings

      • WhyNotWin11.exe (PID: 976)
    • Reads the computer name

      • WhyNotWin11.exe (PID: 976)
    • Create files in a temporary directory

      • WhyNotWin11.exe (PID: 976)
      • dxdiag.exe (PID: 1280)
    • Reads the software policy settings

      • dxdiag.exe (PID: 1280)
    • The process uses AutoIt

      • WhyNotWin11.exe (PID: 976)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 1280)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:10:10 02:05:09+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.16
CodeSize: 734208
InitializedDataSize: 1799168
UninitializedDataSize: -
EntryPoint: 0x2549c
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 2.6.1.1
ProductVersionNumber: 2.6.1.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 2.6.1.1
Comments: https://www.whynotwin11.org
FileDescription: Detection Script to help identify why your PC isn't Windows 11 Release Ready. Now Supporting Update Checks!
ProductName: WhyNotWin11
ProductVersion: 2.6.1.1
CompanyName: Robert Maehl Software
LegalCopyright: Robert Maehl, using LGPL 3 License
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start whynotwin11.exe no specs sppextcomobj.exe no specs slui.exe no specs dxdiag.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
976"C:\Users\admin\AppData\Local\Temp\WhyNotWin11.exe" C:\Users\admin\AppData\Local\Temp\WhyNotWin11.exeexplorer.exe
User:
admin
Company:
Robert Maehl Software
Integrity Level:
MEDIUM
Description:
Detection Script to help identify why your PC isn't Windows 11 Release Ready. Now Supporting Update Checks!
Version:
2.6.1.1
Modules
Images
c:\users\admin\appdata\local\temp\whynotwin11.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\msvcrt.dll
1272"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1280C:\WINDOWS\system32\dxdiag.exe /whql:off /dontskip /t C:\Users\admin\AppData\Local\Temp\dxdiaghetknjn.tmpC:\Windows\System32\dxdiag.exeWhyNotWin11.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6240C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
5 191
Read events
5 078
Write events
92
Delete events
21

Modification events

(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In SystemInfo
Value:
1
(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In SystemInfo
Value:

(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In DirectDraw
Value:
1
(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In VideoCapture
Value:

(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In Diagnostics
Value:
1
(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In DirectDraw
Value:

(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In DirectSound
Value:
1
(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In DirectSound
Value:

(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In VideoCapture
Value:
1
(PID) Process:(1280) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In Diagnostics
Value:

Executable files
55
Suspicious files
61
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
976WhyNotWin11.exeC:\Users\admin\AppData\Local\WhyNotWin11\Langs\versiontext
MD5:5D27E658531BB48FD4A01B2190DEEC34
SHA256:7E151C95984ED5050ECE07B3DA62CC2ABA9779963E51DBCC1D02AA8E6E202953
976WhyNotWin11.exeC:\Users\admin\AppData\Local\Temp\autBD7A.tmpbinary
MD5:086B23DC97DF2409C8AEA5ACE9B5DE69
SHA256:CBF003814DFE54A625564F65585D9A490567C0F3FF79A76552FA665EA7245042
976WhyNotWin11.exeC:\Users\admin\AppData\Local\Temp\autBD47.tmpbinary
MD5:B7B8373BE18F925CCBCECA98A0EC5645
SHA256:32E3CC29F89E7CAE596CA4F744707B7B061B640EBBD8B7ABBA42C0FC7CEAD4F3
976WhyNotWin11.exeC:\Users\admin\AppData\Local\Temp\autBD57.tmpbinary
MD5:B875055DC089DED5834E93D933177F8B
SHA256:C835962C60751A2DC1A8F3E9A9F49D93B8CC6549432CF140C4B55B14A05C57BE
976WhyNotWin11.exeC:\Users\admin\AppData\Local\WhyNotWin11\Langs\0C01.langtext
MD5:194E67CE6BA03EB886D0FD15754199C3
SHA256:953F0869E1D2DC4104B86EBAFCEBBD53445C1E46E72AD7393D67571DC072B977
976WhyNotWin11.exeC:\Users\admin\AppData\Local\WhyNotWin11\Langs\0C0A.langtext
MD5:983783393A456A23914CA17F1321AEE3
SHA256:3FC1D8D692F1629EC21E88B1716E0CF9B913CC01967A28C69A7138164F7B6A92
976WhyNotWin11.exeC:\Users\admin\AppData\Local\Temp\autBD68.tmpbinary
MD5:9C9B52329B168F08C1DAC1F7B5277CE9
SHA256:B5C574B978DBE9231FB917C89ADE82DB4CEA9D2789FA222C86222611A2B44A16
976WhyNotWin11.exeC:\Users\admin\AppData\Local\Temp\autBD79.tmpbinary
MD5:FFEDC56A715F37A020C6813C81789877
SHA256:CDD0EE89793C97669D68A2617370107BA0604DB4236FE0BF47C52249D169E710
976WhyNotWin11.exeC:\Users\admin\AppData\Local\WhyNotWin11\Langs\0404.langtext
MD5:C4DD2F0A4E4BA178C132E957C06BAE2B
SHA256:C5B58B3ADFC49BC9410341462EBF18E368692A374EC8E4EBFB9B1A0406624853
976WhyNotWin11.exeC:\Users\admin\AppData\Local\Temp\autBDAB.tmpbinary
MD5:98FF1DA3F985CAC6E453B71EAFAD1320
SHA256:25B287B690FFF5DB7825138BF4FBB74D3C1AB59A7014680491403E38CB4EB157
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.190:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1012
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1012
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.190:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.184.238
whitelisted
crl.microsoft.com
  • 23.48.23.190
  • 23.48.23.179
  • 23.48.23.183
  • 23.48.23.181
  • 23.48.23.193
  • 23.48.23.192
  • 23.48.23.141
  • 23.48.23.139
  • 23.48.23.185
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.131
  • 40.126.31.130
  • 20.190.159.64
  • 40.126.31.0
  • 40.126.31.129
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info