File name:

start.exe

Full analysis: https://app.any.run/tasks/e67b1e4c-b3de-45e6-991e-97817ebe7cb4
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: April 13, 2025, 17:46:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
xworm
crypto-regex
remote
nodejs
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

7312A16D5E451BF87464D042F33CD452

SHA1:

529F6657AA282F9607EBA50A8E4AB2F44AD326F8

SHA256:

010FF5ABD4624600278FE65EE7324EE19AEA0E9ADA63E0B3EFF220A85B8694EB

SSDEEP:

768:6WWBlpdlu0hPAdTTmEQgeMpkeehPZW0suh9Z7y2jaioFNt9i6OPhXHVY+KmN:69drufFTGr940suLW9Ff9i6OPFV9xN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • start.exe (PID: 2384)
      • Windows.exe (PID: 5576)
    • Changes the autorun value in the registry

      • start.exe (PID: 2384)
      • reg.exe (PID: 8064)
      • CCleaner64.exe (PID: 7848)
      • Windows.exe (PID: 5576)
    • Create files in the Startup directory

      • start.exe (PID: 2384)
      • Windows.exe (PID: 5576)
    • XWORM has been detected (YARA)

      • start.exe (PID: 2384)
    • XWORM has been detected (SURICATA)

      • start.exe (PID: 2384)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • start.exe (PID: 2384)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
    • Reads security settings of Internet Explorer

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • CCleaner64.exe (PID: 6344)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
      • Windows.exe (PID: 5576)
    • Reads the date of Windows installation

      • start.exe (PID: 2384)
      • CCleaner64.exe (PID: 6344)
      • CCleaner64.exe (PID: 7760)
      • Windows.exe (PID: 5576)
    • Checks for external IP

      • start.exe (PID: 2384)
      • svchost.exe (PID: 2196)
      • CCleaner64.exe (PID: 7760)
      • svchost.exe (PID: 2148)
      • Windows.exe (PID: 5576)
    • Contacting a server suspected of hosting an CnC

      • start.exe (PID: 2384)
    • Found regular expressions for crypto-addresses (YARA)

      • start.exe (PID: 2384)
    • Connects to unusual port

      • start.exe (PID: 2384)
    • Application launched itself

      • Skype.exe (PID: 7800)
      • CCleaner64.exe (PID: 6344)
      • CCleaner64.exe (PID: 7760)
    • Uses REG/REGEDIT.EXE to modify registry

      • Skype.exe (PID: 7800)
    • Detected use of alternative data streams (AltDS)

      • Skype.exe (PID: 7800)
    • The process executes via Task Scheduler

      • Windows.exe (PID: 7764)
      • Windows.exe (PID: 6248)
      • Windows.exe (PID: 7696)
      • Windows.exe (PID: 1196)
      • Windows.exe (PID: 5576)
      • PLUGScheduler.exe (PID: 4052)
    • Reads Internet Explorer settings

      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
    • The process verifies whether the antivirus software is installed

      • CCleaner64.exe (PID: 7848)
    • There is functionality for taking screenshot (YARA)

      • Skype.exe (PID: 8028)
    • Searches for installed software

      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
  • INFO

    • Checks supported languages

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • Skype.exe (PID: 7916)
      • Skype.exe (PID: 8028)
      • Skype.exe (PID: 8048)
      • Skype.exe (PID: 6112)
      • Skype.exe (PID: 4164)
      • CCleaner64.exe (PID: 6344)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
      • Windows.exe (PID: 6248)
      • start.exe (PID: 920)
      • Skype.exe (PID: 7608)
      • Windows.exe (PID: 7696)
      • Windows.exe (PID: 1196)
      • PLUGScheduler.exe (PID: 4052)
      • Windows.exe (PID: 5576)
      • Windows.exe (PID: 6324)
      • Windows.exe (PID: 6360)
      • Windows.exe (PID: 7764)
    • Reads the computer name

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • Skype.exe (PID: 8028)
      • Skype.exe (PID: 8048)
      • Skype.exe (PID: 6112)
      • CCleaner64.exe (PID: 6344)
      • CCleaner64.exe (PID: 7760)
      • Windows.exe (PID: 7764)
      • CCleaner64.exe (PID: 7848)
      • Windows.exe (PID: 6248)
      • start.exe (PID: 920)
      • Skype.exe (PID: 7608)
      • Windows.exe (PID: 7696)
      • Windows.exe (PID: 1196)
      • PLUGScheduler.exe (PID: 4052)
      • Windows.exe (PID: 5576)
      • Windows.exe (PID: 6324)
      • Windows.exe (PID: 6360)
    • Reads the machine GUID from the registry

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • Windows.exe (PID: 7764)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
      • Windows.exe (PID: 6248)
      • start.exe (PID: 920)
      • Skype.exe (PID: 7608)
      • Windows.exe (PID: 7696)
      • Windows.exe (PID: 1196)
      • Windows.exe (PID: 5576)
      • Windows.exe (PID: 6324)
      • Windows.exe (PID: 6360)
    • Disables trace logs

      • start.exe (PID: 2384)
      • Windows.exe (PID: 5576)
    • Reads Environment values

      • start.exe (PID: 2384)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
      • CCleaner64.exe (PID: 6344)
      • Windows.exe (PID: 5576)
    • Checks proxy server information

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • CCleaner64.exe (PID: 7760)
      • slui.exe (PID: 5260)
      • Windows.exe (PID: 5576)
    • Creates files or folders in the user directory

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • Skype.exe (PID: 6112)
      • Skype.exe (PID: 8048)
      • CCleaner64.exe (PID: 7760)
    • Process checks computer location settings

      • start.exe (PID: 2384)
      • Skype.exe (PID: 7800)
      • Skype.exe (PID: 6112)
      • Skype.exe (PID: 4164)
      • CCleaner64.exe (PID: 6344)
      • CCleaner64.exe (PID: 7760)
      • Windows.exe (PID: 5576)
    • Manual execution by a user

      • Skype.exe (PID: 7800)
      • CCleaner64.exe (PID: 6344)
      • Taskmgr.exe (PID: 7336)
      • Taskmgr.exe (PID: 7360)
      • start.exe (PID: 920)
      • Windows.exe (PID: 6324)
      • Windows.exe (PID: 6360)
    • Reads CPU info

      • Skype.exe (PID: 7800)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
    • Create files in a temporary directory

      • Skype.exe (PID: 7800)
    • Reads the software policy settings

      • Skype.exe (PID: 7800)
      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
      • slui.exe (PID: 1228)
      • slui.exe (PID: 5260)
    • Node.js compiler has been detected

      • Skype.exe (PID: 7800)
      • Skype.exe (PID: 7916)
      • Skype.exe (PID: 8028)
      • Skype.exe (PID: 8048)
      • Skype.exe (PID: 6112)
      • Skype.exe (PID: 4164)
    • The sample compiled with english language support

      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
    • Reads product name

      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
    • Creates files in the program directory

      • CCleaner64.exe (PID: 7760)
      • CCleaner64.exe (PID: 7848)
      • PLUGScheduler.exe (PID: 4052)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 7336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(2384) start.exe
C2bobrohost.ddns.net:1488
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameЭТО НУРИК!
Mutex1vmMaAautCIYL8OB
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:12 12:16:33+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 46080
InitializedDataSize: 272384
UninitializedDataSize: -
EntryPoint: 0xd2ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: start.exe
LegalCopyright:
OriginalFileName: start.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
297
Monitored processes
46
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #XWORM start.exe svchost.exe sppextcomobj.exe no specs slui.exe schtasks.exe no specs conhost.exe no specs skype.exe skype.exe no specs skype.exe no specs skype.exe reg.exe conhost.exe no specs skype.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs skype.exe no specs ccleaner64.exe no specs ccleaner64.exe windows.exe no specs ccleaner64.exe taskmgr.exe no specs taskmgr.exe slui.exe rundll32.exe no specs windows.exe no specs start.exe no specs skype.exe no specs windows.exe no specs windows.exe no specs plugscheduler.exe no specs windows.exe windows.exe no specs windows.exe no specs svchost.exe schtasks.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
920"C:\Users\admin\Desktop\start.exe" C:\Users\admin\Desktop\start.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\start.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1012C:\WINDOWS\system32\reg.exe QUERY HKCU\Software\Microsoft\Edge\BLBeacon /v versionC:\Windows\SysWOW64\reg.exeSkype.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1128C:\WINDOWS\system32\reg.exe QUERY "HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths\msedge.exe" /veC:\Windows\SysWOW64\reg.exeSkype.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1196"C:\Users\admin\AppData\Roaming\Windows.exe"C:\Users\admin\AppData\Roaming\Windows.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\windows.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1228"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2148C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2384"C:\Users\admin\Desktop\start.exe" C:\Users\admin\Desktop\start.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\start.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(2384) start.exe
C2bobrohost.ddns.net:1488
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameЭТО НУРИК!
Mutex1vmMaAautCIYL8OB
3192\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
34 336
Read events
34 134
Write events
130
Delete events
72

Modification events

(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2384) start.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\start_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
8
Suspicious files
112
Text files
13
Unknown types
1

Dropped files

PID
Process
Filename
Type
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\Local Storage\leveldb\LOG.oldtext
MD5:46EED8B7CAAD25F7F453617DA0FB0857
SHA256:5BC1DE0E32F2969386351B2BE088F13B6CC3DF7693EE9E92FEEF59DB6AF1FB92
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\Crashpad\settings.datbinary
MD5:9D0439A794AA96ABD6AFF504C86C7F31
SHA256:5DBC3A5DAF431973E245D83AB51B128E9C4CC2F3ECD61C45C88DB161ACC25B7B
2384start.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnkbinary
MD5:43EB428CCBB5CA44DF93E0268202AE21
SHA256:4797F5A1672239AED67B9BE420F1E71E5FE96E9DCFA6179665821953576A620A
2384start.exeC:\Users\admin\AppData\Roaming\Windows.exeexecutable
MD5:7312A16D5E451BF87464D042F33CD452
SHA256:010FF5ABD4624600278FE65EE7324EE19AEA0E9ADA63E0B3EFF220A85B8694EB
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HQWUJVRLKOW3Y6OA9KVX.tempbinary
MD5:AF9E6ED58D6CABFDB14C0E5153B3490F
SHA256:5FC57A82E5433F1A18F3E380F6A9E6D8F8785AA8F63ED8C4CAC9EEB9341206BD
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dictext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Spelling\en-US\default.exctext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
6112Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\CS_skylib\CS_shared.confbinary
MD5:99914B932BD37A50B983C5E7C90AE93B
SHA256:44136FA355B3678A1146AD16F7E8649E94FB4FC21FE77E8310C060F61CAAFF8A
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\settings.jsonbinary
MD5:E90AE9B78AADF8A9F21B23E21924E4CD
SHA256:81422CB721FB59D7B510A4C06AD14006AF004415BAE7A4479273D693008BB286
7800Skype.exeC:\Users\admin\AppData\Roaming\Microsoft\Skype for Desktop\IndexedDB\file__0.indexeddb.leveldb\LOG.oldtext
MD5:D9CF6AAE805A20C96EF6414D030D6CE8
SHA256:6AFE86308EA331969317D933883AAB0D08EF96B7F14F54E45C0145D4D757DCD5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
71
DNS requests
55
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2384
start.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7760
CCleaner64.exe
GET
200
23.50.131.77:80
http://ncc.avast.com/ncc.txt
unknown
whitelisted
7760
CCleaner64.exe
GET
200
142.250.186.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
7760
CCleaner64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
7848
CCleaner64.exe
GET
200
23.50.131.77:80
http://ncc.avast.com/ncc.txt
unknown
whitelisted
5360
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7760
CCleaner64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAXfj0A2M0oL7zuU%2F%2F2jetU%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5376
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.183:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2384
start.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
6544
svchost.exe
40.126.31.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2384
start.exe
178.78.23.92:1488
bobrohost.ddns.net
JSC ER-Telecom Holding
RU
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.48.23.183
  • 23.48.23.173
  • 23.48.23.176
  • 23.48.23.181
  • 23.48.23.177
  • 23.48.23.180
  • 23.48.23.188
  • 23.48.23.174
  • 23.48.23.185
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
login.live.com
  • 40.126.31.131
  • 40.126.31.1
  • 20.190.159.4
  • 40.126.31.129
  • 20.190.159.128
  • 40.126.31.67
  • 20.190.159.2
  • 40.126.31.2
  • 20.190.159.130
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
bobrohost.ddns.net
  • 178.78.23.92
malicious
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2384
start.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2384
start.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
2384
start.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm TCP Packet
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com)
7760
CCleaner64.exe
Misc activity
ET INFO Observed External IP Lookup Domain (ip-info .ff .avast .com) in TLS SNI
2148
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2148
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
No debug info