www.microsoft.com Open in urlscan Pro
2a02:26f0:7100:992::356e  Public Scan

Submitted URL: https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:Win32/Keygen!pz&threatid=2147890630&enterprise=1
Effective URL: https://www.microsoft.com/en-us/wdsi/threats
Submission: On December 13 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: searchFormGET https://www.microsoft.com/en-us/search/explore

<form class="c-search" autocomplete="off" id="searchForm" name="searchForm" role="search" action="https://www.microsoft.com/en-us/search/explore" method="GET"
  data-seautosuggest="{&quot;queryParams&quot;:{&quot;market&quot;:&quot;en-us&quot;,&quot;clientId&quot;:&quot;7F27B536-CF6B-4C65-8638-A0F8CBDFCA65&quot;,&quot;sources&quot;:&quot;Iris-Products,DCatAll-Products,Microsoft-Terms&quot;,&quot;filter&quot;:&quot;+ClientType:StoreWeb&quot;,&quot;counts&quot;:&quot;1,5,5&quot;},&quot;familyNames&quot;:{&quot;Apps&quot;:&quot;App&quot;,&quot;Books&quot;:&quot;Book&quot;,&quot;Bundles&quot;:&quot;Bundle&quot;,&quot;Devices&quot;:&quot;Device&quot;,&quot;Fees&quot;:&quot;Fee&quot;,&quot;Games&quot;:&quot;Game&quot;,&quot;MusicAlbums&quot;:&quot;Album&quot;,&quot;MusicTracks&quot;:&quot;Song&quot;,&quot;MusicVideos&quot;:&quot;Video&quot;,&quot;MusicArtists&quot;:&quot;Artist&quot;,&quot;OperatingSystem&quot;:&quot;Operating System&quot;,&quot;Software&quot;:&quot;Software&quot;,&quot;Movies&quot;:&quot;Movie&quot;,&quot;TV&quot;:&quot;TV&quot;,&quot;CSV&quot;:&quot;Gift Card&quot;,&quot;VideoActor&quot;:&quot;Actor&quot;}}"
  data-seautosuggestapi="https://www.microsoft.com/msstoreapiprod/api/autosuggest"
  data-m="{&quot;cN&quot;:&quot;GlobalNav_Search_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c1c9c4c1m1r1a1&quot;}" aria-expanded="false"
  style="overflow-x: visible;">
  <div class="x-screen-reader" aria-live="assertive"></div>
  <input id="cli_shellHeaderSearchInput" aria-label="Search Expanded" aria-expanded="false" aria-controls="universal-header-search-auto-suggest-transparent" aria-owns="universal-header-search-auto-suggest-ul" type="search" name="q"
    placeholder="Search Microsoft.com" data-m="{&quot;cN&quot;:&quot;SearchBox_nav&quot;,&quot;id&quot;:&quot;n1c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:1,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" data-toggle="tooltip" data-placement="right"
    title="Search Microsoft.com" role="combobox" aria-autocomplete="list" style="overflow-x: visible;">
  <button id="search" aria-label="Search Microsoft.com" class="c-glyph" data-m="{&quot;cN&quot;:&quot;Search_nav&quot;,&quot;id&quot;:&quot;n2c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:2,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" data-bi-mto="true"
    aria-expanded="false" style="overflow-x: visible;">
    <span role="presentation" style="overflow-x: visible;">Search</span>
    <span role="tooltip" class="c-uhf-tooltip c-uhf-search-tooltip" style="overflow-x: visible;">Search Microsoft.com</span>
  </button>
  <div class="m-auto-suggest" id="universal-header-search-auto-suggest-transparent" role="group" style="overflow-x: visible;">
    <ul class="c-menu" id="universal-header-search-auto-suggest-ul" aria-label="Search Suggestions" aria-hidden="true" data-bi-dnt="true" data-bi-mto="true" data-js-auto-suggest-position="default" role="listbox" data-tel="jsll"
      data-m="{&quot;cN&quot;:&quot;search suggestions_cont&quot;,&quot;cT&quot;:&quot;Container&quot;,&quot;id&quot;:&quot;c3c3c1c9c4c1m1r1a1&quot;,&quot;sN&quot;:3,&quot;aN&quot;:&quot;c3c1c9c4c1m1r1a1&quot;}" style="overflow-x: visible;"></ul>
    <ul class="c-menu f-auto-suggest-no-results" aria-hidden="true" data-js-auto-suggest-postion="default" data-js-auto-suggest-position="default" role="listbox" style="overflow-x: visible;">
      <li class="c-menu-item" style="overflow-x: visible;"> <span tabindex="-1" style="overflow-x: visible;">No results</span></li>
    </ul>
  </div>
</form>

Text Content

This is the Trace Id: dae4ac1f43f5387aaaaa06923dfeca0c



We use optional cookies to improve your experience on our websites, such as
through social media connections, and to display personalized advertising based
on your online activity. If you reject optional cookies, only cookies necessary
to provide you the services will be used. You may change your selection by
clicking “Manage Cookies” at the bottom of the page. Privacy Statement
Third-Party Cookies

Accept Reject Manage cookies
Skip to main content
Microsoft
Microsoft Security Intelligence
Microsoft Security Intelligence
Microsoft Security Intelligence
 * Home
 * Threats
 * Blogs
 * Downloads
    * Updates Updates
      * Antimalware updates
      * Definition change log
    * Security software Security software
      * Windows security
      * Microsoft Defender ATP
      * Microsoft Threat Protection
    * Cleanup tools Cleanup tools
      * Malicious Software Removal Tool (MSRT)
      * Safety Scanner
      * Microsoft Defender Offline

 * Submissions
    * Submit a file
    * View submission history
    * Report unsafe site
    * Attack surface reduction

 * Help
    * Safety tips Safety tips
      * Sources of infection
      * Avoid tech support scams
      * Troubleshoot detection and removal
      * Up-to-date software
    * Developer resources
    * Our methodologies Our methodologies
      * Threat naming
      * Threat identification criteria
    * Security industry alliances

 * More

 * All Microsoft
   
   
    * GLOBAL
      
      * Microsoft Security
      * Azure
      * Dynamics 365
      * Microsoft 365
      * Microsoft Teams
      * Windows 365
    * Tech & innovation Tech & innovation
      * Microsoft Cloud
      * AI
      * Azure Space
      * Mixed reality
      * Microsoft HoloLens
      * Microsoft Viva
      * Quantum computing
      * Sustainability
    * Industries Industries
      * Education
      * Automotive
      * Financial services
      * Government
      * Healthcare
      * Manufacturing
      * Retail
      * All industries
    * Partners Partners
      * Find a partner
      * Become a partner
      * Partner Network
      * Azure Marketplace
      * AppSource
    * Resources Resources
      * Blog
      * Microsoft Advertising
      * Developer Center
      * Documentation
      * Events
      * Licensing
      * Microsoft Learn
      * Microsoft Research
    * View Sitemap


Search Search Microsoft.com
 * No results

Cancel 0 Cart 0 items in shopping cart
Sign in to your account
Sign in



Search encyclopedia

THREAT TRENDS


RANSOMWARE

Discover what makes ransomware one of the most prevalent threats
Ransomware-as-a-service (RaaS) Incident response playbook for ransomware
Microsoft defense against ransomware


IDENTITY-BASED ATTACKS

Learn about the different techniques threat actors are using to attack
identities and gain access to resources
Adversary-in-the-middle (AiTM) Token theft Password spray attacks


BUSINESS EMAIL COMPROMISE (BEC)

Identify BEC attacks and learn how to protect organizations from this threat
Understand how BEC works Detect and mitigate a BEC campaign Disrupt BEC attacks

THREAT ACTOR UPDATES


NATION-STATE THREAT ACTORS

Nation-state threat actors launch cyber operations that are often focused on
collecting data on their targets
Blizzard threat actors Sandstorm threat actors Typhoon threat actors


FINANCIALLY MOTIVATED THREAT ACTORS

Cybercriminals continue to enhance their tools and techniques to maximize the
impact of their campaigns, including ransomware and identity theft 
Octo Tempest Storm-0501 Other financially motivated actors


NATION-STATE INFLUENCE OPERATIONS

Nation-states launch influence operations to sway public perception and
sentiment, sow discord, and undermine trust in public institutions
Russian influence operations Iranian influence operations Chinese influence
operations


THREAT ACTOR SPOTLIGHT: SLEET ACTORS

Learn about the latest activity associated with North Korean threat actors
Sleet threat actors


MICROSOFT THREAT ACTOR NAMING TAXONOMY

Learn about how Microsoft names threat actors 
Complete list of threat actor categories


THREAT ACTORS USING AI

Learn about emerging threats in the age of AI, focusing on identified activity
associated with known threat actors
How threat actors are using AI in their campaigns


FOLLOW US

 * 
 * 
 * 

What's new
 * Surface Pro
 * Surface Laptop
 * Surface Laptop Studio 2
 * Surface Laptop Go 3
 * Microsoft Copilot
 * AI in Windows
 * Explore Microsoft products
 * Windows 11 apps

Microsoft Store
 * Account profile
 * Download Center
 * Microsoft Store support
 * Returns
 * Order tracking
 * Certified Refurbished
 * Microsoft Store Promise
 * Flexible Payments

Education
 * Microsoft in education
 * Devices for education
 * Microsoft Teams for Education
 * Microsoft 365 Education
 * How to buy for your school
 * Educator training and development
 * Deals for students and parents
 * Azure for students

Business
 * Microsoft Cloud
 * Microsoft Security
 * Dynamics 365
 * Microsoft 365
 * Microsoft Power Platform
 * Microsoft Teams
 * Microsoft 365 Copilot
 * Small Business

Developer & IT
 * Azure
 * Developer Center
 * Documentation
 * Microsoft Learn
 * Microsoft Tech Community
 * Azure Marketplace
 * AppSource
 * Visual Studio

Company
 * Careers
 * About Microsoft
 * Company news
 * Privacy at Microsoft
 * Investors
 * Diversity and inclusion
 * Accessibility
 * Sustainability

English (United States) Your Privacy Choices Opt-Out Icon Your Privacy Choices
Your Privacy Choices Opt-Out Icon Your Privacy Choices Consumer Health Privacy
 * Sitemap
 * Contact Microsoft
 * Privacy
 * Manage cookies
 * Terms of use
 * Trademarks
 * Safety & eco
 * Recycling
 * About our ads
 * © Microsoft 2024