File name:

AzorultExecutor.zip

Full analysis: https://app.any.run/tasks/13557be3-2921-4dd1-9283-184a2b6960be
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 18, 2025, 05:00:04
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
rat
rms
remote
autoit
evasion
github
auto-reg
rdp
auto-sch
rdpwrap
rmm-tool
delphi
aspack
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

8AD92677FF9A9A1B5AC4365DA66ED562

SHA1:

DC910382181C1E323FE8E9F41793711051782706

SHA256:

258BBC42A9AFB92E2C79C4C7435EC971942687AC29561376F57245AF3DA3824E

SSDEEP:

98304:qzAdSrqUyyZhDyUeckJUI58MLfM4gpoJ28YOskSMRMqwlNk4mpxiyGlkZh+d3ur3:qsdSD8Dtt7aKb3I5q1g3bIx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Disables Windows Defender

      • Azorult.exe (PID: 5376)
    • UAC/LUA settings modification

      • Azorult.exe (PID: 5376)
      • regedit.exe (PID: 1452)
    • RMS is detected

      • regedit.exe (PID: 1452)
      • regedit.exe (PID: 5164)
      • rutserv.exe (PID: 5380)
    • Uses Task Scheduler to run other applications

      • taskhost.exe (PID: 1280)
      • Azorult.exe (PID: 5376)
    • Starts NET.EXE to view/add/change user profiles

      • cmd.exe (PID: 3156)
      • net.exe (PID: 7528)
    • Changes the autorun value in the registry

      • taskhostw.exe (PID: 4424)
    • Starts NET.EXE to view/change users localgroup

      • net.exe (PID: 8072)
      • cmd.exe (PID: 3156)
      • net.exe (PID: 8104)
      • net.exe (PID: 4988)
      • net.exe (PID: 3024)
      • net.exe (PID: 7612)
      • net.exe (PID: 7352)
      • net.exe (PID: 7496)
      • net.exe (PID: 208)
      • net.exe (PID: 7748)
    • Uses Task Scheduler to autorun other applications

      • taskhost.exe (PID: 1280)
      • Azorult.exe (PID: 5376)
    • Changes the Windows auto-update feature

      • powershell.exe (PID: 8040)
    • RDPWRAP has been detected

      • RDPWInst.exe (PID: 7384)
    • Creates or modifies Windows services

      • RDPWInst.exe (PID: 7384)
    • Starts NET.EXE to view/change login properties

      • cmd.exe (PID: 3156)
      • net.exe (PID: 9164)
    • RMS has been detected (YARA)

      • rutserv.exe (PID: 5380)
      • rfusclient.exe (PID: 6080)
      • rfusclient.exe (PID: 1096)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 5984)
      • wini.exe (PID: 6592)
      • cheat.exe (PID: 968)
      • WinRAR.exe (PID: 1660)
      • ink.exe (PID: 4424)
      • winit.exe (PID: 616)
      • R8.exe (PID: 8164)
      • winlog.exe (PID: 7608)
      • winlogon.exe (PID: 6564)
      • taskhost.exe (PID: 1280)
      • Azorult.exe (PID: 5376)
      • RDPWInst.exe (PID: 7384)
      • taskhostw.exe (PID: 4424)
      • RDPWInst.exe (PID: 8516)
    • Executable content was dropped or overwritten

      • Azorult.exe (PID: 5376)
      • wini.exe (PID: 6592)
      • cheat.exe (PID: 968)
      • P.exe (PID: 5868)
      • R8.exe (PID: 8164)
      • winlog.exe (PID: 7608)
      • Rar.exe (PID: 7224)
      • taskhost.exe (PID: 1280)
      • taskhostw.exe (PID: 4424)
      • RDPWInst.exe (PID: 7384)
    • The process executes VB scripts

      • wini.exe (PID: 6592)
      • R8.exe (PID: 8164)
      • cmd.exe (PID: 7248)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 4220)
      • wscript.exe (PID: 2064)
      • wscript.exe (PID: 4428)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 4220)
      • WinRAR.exe (PID: 1660)
      • winit.exe (PID: 616)
      • wscript.exe (PID: 2064)
      • winlogon.exe (PID: 6564)
      • wscript.exe (PID: 4428)
      • taskhost.exe (PID: 1280)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 4220)
      • WinRAR.exe (PID: 1660)
      • Azorult.exe (PID: 5376)
      • winit.exe (PID: 616)
      • wscript.exe (PID: 2064)
      • winlogon.exe (PID: 6564)
      • wscript.exe (PID: 4428)
      • taskhost.exe (PID: 1280)
      • winlogon.exe (PID: 7988)
      • taskhostw.exe (PID: 4424)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 5512)
      • cmd.exe (PID: 8088)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 6876)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 5512)
      • cmd.exe (PID: 3156)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 5512)
      • cmd.exe (PID: 3156)
      • cmd.exe (PID: 6876)
    • Restarts service on failure

      • sc.exe (PID: 4464)
    • Windows service management via SC.EXE

      • sc.exe (PID: 5084)
      • sc.exe (PID: 2100)
      • sc.exe (PID: 4108)
      • sc.exe (PID: 2108)
      • sc.exe (PID: 7924)
      • sc.exe (PID: 7580)
      • sc.exe (PID: 7836)
      • sc.exe (PID: 1452)
      • sc.exe (PID: 8008)
      • sc.exe (PID: 8092)
      • sc.exe (PID: 7364)
      • sc.exe (PID: 7912)
      • sc.exe (PID: 7536)
      • sc.exe (PID: 7704)
    • Potential Corporate Privacy Violation

      • rutserv.exe (PID: 5380)
      • winit.exe (PID: 616)
      • svchost.exe (PID: 2196)
      • Azorult.exe (PID: 5376)
      • taskhostw.exe (PID: 4424)
      • taskhost.exe (PID: 1280)
    • The process creates files with name similar to system file names

      • cheat.exe (PID: 968)
      • Azorult.exe (PID: 5376)
    • Executes as Windows Service

      • rutserv.exe (PID: 5380)
    • Connects to unusual port

      • rutserv.exe (PID: 5380)
    • Sets the service to start on system boot

      • sc.exe (PID: 7408)
      • sc.exe (PID: 7496)
    • Stops a currently running service

      • sc.exe (PID: 7664)
      • sc.exe (PID: 7748)
      • sc.exe (PID: 8176)
      • sc.exe (PID: 6044)
      • sc.exe (PID: 7448)
      • sc.exe (PID: 7620)
      • sc.exe (PID: 3768)
    • Application launched itself

      • rfusclient.exe (PID: 6080)
    • There is functionality for taking screenshot (YARA)

      • Azorult.exe (PID: 5376)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 8104)
      • cmd.exe (PID: 8012)
      • cmd.exe (PID: 2852)
      • cmd.exe (PID: 7824)
      • cmd.exe (PID: 4000)
      • cmd.exe (PID: 4464)
      • cmd.exe (PID: 7384)
      • cmd.exe (PID: 7560)
      • cmd.exe (PID: 7764)
      • cmd.exe (PID: 7768)
      • cmd.exe (PID: 8064)
      • cmd.exe (PID: 7252)
      • cmd.exe (PID: 7336)
      • cmd.exe (PID: 7360)
      • cmd.exe (PID: 8024)
      • cmd.exe (PID: 7968)
      • cmd.exe (PID: 8076)
      • cmd.exe (PID: 8028)
      • cmd.exe (PID: 7396)
      • cmd.exe (PID: 7668)
      • cmd.exe (PID: 3156)
      • RDPWInst.exe (PID: 7384)
    • Uses NETSH.EXE to change the status of the firewall

      • cmd.exe (PID: 7852)
    • The process verifies whether the antivirus software is installed

      • winit.exe (PID: 616)
      • icacls.exe (PID: 7616)
      • icacls.exe (PID: 7720)
      • icacls.exe (PID: 924)
      • Azorult.exe (PID: 5376)
      • icacls.exe (PID: 7372)
      • icacls.exe (PID: 7396)
      • icacls.exe (PID: 7684)
      • icacls.exe (PID: 3304)
      • icacls.exe (PID: 8024)
      • icacls.exe (PID: 5124)
      • icacls.exe (PID: 5508)
      • icacls.exe (PID: 7688)
      • icacls.exe (PID: 7844)
      • icacls.exe (PID: 872)
      • icacls.exe (PID: 7924)
    • Checks for external IP

      • winit.exe (PID: 616)
      • svchost.exe (PID: 2196)
      • Azorult.exe (PID: 5376)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 7800)
      • cmd.exe (PID: 8056)
      • cmd.exe (PID: 7708)
      • cmd.exe (PID: 6564)
      • cmd.exe (PID: 1600)
      • cmd.exe (PID: 7540)
      • cmd.exe (PID: 7492)
      • cmd.exe (PID: 7720)
      • cmd.exe (PID: 7568)
      • cmd.exe (PID: 7516)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 8160)
      • cmd.exe (PID: 5164)
      • cmd.exe (PID: 7776)
      • cmd.exe (PID: 7864)
      • cmd.exe (PID: 8060)
      • cmd.exe (PID: 8076)
      • cmd.exe (PID: 8032)
      • cmd.exe (PID: 2100)
      • cmd.exe (PID: 7344)
      • cmd.exe (PID: 4464)
      • cmd.exe (PID: 7328)
      • cmd.exe (PID: 2664)
      • cmd.exe (PID: 7732)
      • cmd.exe (PID: 7684)
      • cmd.exe (PID: 6828)
      • cmd.exe (PID: 7800)
      • cmd.exe (PID: 7920)
      • cmd.exe (PID: 8116)
      • cmd.exe (PID: 7372)
      • cmd.exe (PID: 7556)
      • cmd.exe (PID: 7524)
      • cmd.exe (PID: 5936)
      • cmd.exe (PID: 732)
      • cmd.exe (PID: 7476)
      • cmd.exe (PID: 7904)
      • cmd.exe (PID: 8056)
      • cmd.exe (PID: 1272)
      • cmd.exe (PID: 7580)
      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 7936)
      • cmd.exe (PID: 7900)
      • cmd.exe (PID: 7896)
      • cmd.exe (PID: 7672)
      • cmd.exe (PID: 7692)
      • cmd.exe (PID: 6392)
      • cmd.exe (PID: 8032)
      • cmd.exe (PID: 4696)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 7592)
      • cmd.exe (PID: 7760)
      • cmd.exe (PID: 7744)
      • cmd.exe (PID: 7236)
      • cmd.exe (PID: 5744)
      • cmd.exe (PID: 8028)
      • cmd.exe (PID: 7436)
      • cmd.exe (PID: 7408)
      • cmd.exe (PID: 4696)
      • cmd.exe (PID: 6300)
      • cmd.exe (PID: 7696)
      • cmd.exe (PID: 1748)
      • cmd.exe (PID: 6208)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 6876)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 3156)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7308)
    • Detected use of alternative data streams (AltDS)

      • taskhostw.exe (PID: 4424)
    • Lists all scheduled tasks in specific format

      • schtasks.exe (PID: 7404)
    • Modifies hosts file to alter network resolution

      • cmd.exe (PID: 4172)
    • Process drops legitimate windows executable

      • RDPWInst.exe (PID: 7384)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 8404)
      • schtasks.exe (PID: 8412)
      • schtasks.exe (PID: 8436)
      • schtasks.exe (PID: 8552)
      • schtasks.exe (PID: 8560)
      • schtasks.exe (PID: 8576)
      • schtasks.exe (PID: 8584)
      • schtasks.exe (PID: 8592)
      • schtasks.exe (PID: 8604)
      • schtasks.exe (PID: 8612)
      • schtasks.exe (PID: 8628)
      • schtasks.exe (PID: 8276)
      • schtasks.exe (PID: 8332)
      • schtasks.exe (PID: 8340)
      • schtasks.exe (PID: 8348)
    • Process uses IPCONFIG to clear DNS cache

      • cmd.exe (PID: 5172)
    • The process executes via Task Scheduler

      • taskhostw.exe (PID: 8676)
  • INFO

    • Manual execution by a user

      • Azorult.exe (PID: 3304)
      • Azorult.exe (PID: 5376)
      • taskhostw.exe (PID: 7596)
      • winlogon.exe (PID: 7768)
    • Checks supported languages

      • Azorult.exe (PID: 5376)
      • wini.exe (PID: 6592)
      • ShellExperienceHost.exe (PID: 5984)
      • winit.exe (PID: 616)
      • rutserv.exe (PID: 4428)
      • rutserv.exe (PID: 7036)
      • rutserv.exe (PID: 5936)
      • rfusclient.exe (PID: 6080)
      • rfusclient.exe (PID: 1096)
      • cheat.exe (PID: 968)
      • rutserv.exe (PID: 5380)
      • taskhost.exe (PID: 1280)
      • P.exe (PID: 5868)
      • ink.exe (PID: 4424)
      • MpCmdRun.exe (PID: 7324)
      • rfusclient.exe (PID: 5384)
      • R8.exe (PID: 8164)
      • winlog.exe (PID: 7608)
      • Rar.exe (PID: 7224)
      • winlogon.exe (PID: 6564)
      • chcp.com (PID: 5968)
      • taskhostw.exe (PID: 4424)
      • chcp.com (PID: 5588)
      • RDPWInst.exe (PID: 7384)
      • winlogon.exe (PID: 7988)
      • taskhostw.exe (PID: 7596)
      • RDPWInst.exe (PID: 8516)
      • taskhostw.exe (PID: 8676)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1660)
      • wini.exe (PID: 6592)
      • cheat.exe (PID: 968)
      • P.exe (PID: 5868)
      • R8.exe (PID: 8164)
      • Rar.exe (PID: 7224)
      • taskhost.exe (PID: 1280)
      • taskhostw.exe (PID: 4424)
      • RDPWInst.exe (PID: 7384)
    • Reads mouse settings

      • Azorult.exe (PID: 5376)
      • winit.exe (PID: 616)
      • taskhost.exe (PID: 1280)
      • taskhostw.exe (PID: 4424)
      • winlogon.exe (PID: 7988)
      • taskhostw.exe (PID: 7596)
      • taskhostw.exe (PID: 8676)
    • Creates files in the program directory

      • Azorult.exe (PID: 5376)
      • wini.exe (PID: 6592)
      • cheat.exe (PID: 968)
      • P.exe (PID: 5868)
      • winit.exe (PID: 616)
      • winlog.exe (PID: 7608)
      • taskhost.exe (PID: 1280)
      • RDPWInst.exe (PID: 7384)
      • taskhostw.exe (PID: 4424)
    • Reads the computer name

      • Azorult.exe (PID: 5376)
      • ShellExperienceHost.exe (PID: 5984)
      • wini.exe (PID: 6592)
      • rutserv.exe (PID: 7036)
      • rutserv.exe (PID: 5936)
      • rutserv.exe (PID: 4428)
      • rfusclient.exe (PID: 1096)
      • rfusclient.exe (PID: 6080)
      • cheat.exe (PID: 968)
      • rutserv.exe (PID: 5380)
      • P.exe (PID: 5868)
      • ink.exe (PID: 4424)
      • MpCmdRun.exe (PID: 7324)
      • rfusclient.exe (PID: 5384)
      • winit.exe (PID: 616)
      • R8.exe (PID: 8164)
      • winlog.exe (PID: 7608)
      • winlogon.exe (PID: 6564)
      • taskhost.exe (PID: 1280)
      • taskhostw.exe (PID: 4424)
      • RDPWInst.exe (PID: 7384)
      • taskhostw.exe (PID: 7596)
      • RDPWInst.exe (PID: 8516)
      • taskhostw.exe (PID: 8676)
    • Create files in a temporary directory

      • Azorult.exe (PID: 5376)
      • MpCmdRun.exe (PID: 7324)
      • winit.exe (PID: 616)
      • winlogon.exe (PID: 6564)
      • taskhost.exe (PID: 1280)
      • taskhostw.exe (PID: 4424)
    • Process checks computer location settings

      • wini.exe (PID: 6592)
      • cheat.exe (PID: 968)
      • R8.exe (PID: 8164)
      • winlog.exe (PID: 7608)
      • winlogon.exe (PID: 6564)
      • taskhost.exe (PID: 1280)
      • Azorult.exe (PID: 5376)
    • Reads the machine GUID from the registry

      • ink.exe (PID: 4424)
      • winit.exe (PID: 616)
      • RDPWInst.exe (PID: 7384)
      • Azorult.exe (PID: 5376)
      • RDPWInst.exe (PID: 8516)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1660)
    • Checks proxy server information

      • ink.exe (PID: 4424)
      • winit.exe (PID: 616)
      • RDPWInst.exe (PID: 7384)
      • Azorult.exe (PID: 5376)
      • taskhost.exe (PID: 1280)
      • taskhostw.exe (PID: 4424)
      • RDPWInst.exe (PID: 8516)
      • slui.exe (PID: 5640)
    • The process uses AutoIt

      • Azorult.exe (PID: 5376)
    • Reads CPU info

      • winit.exe (PID: 616)
    • Creates files or folders in the user directory

      • winit.exe (PID: 616)
      • RDPWInst.exe (PID: 7384)
      • RDPWInst.exe (PID: 8516)
    • Reads the software policy settings

      • winit.exe (PID: 616)
      • RDPWInst.exe (PID: 7384)
      • Azorult.exe (PID: 5376)
      • RDPWInst.exe (PID: 8516)
      • slui.exe (PID: 5640)
    • Changes the display of characters in the console

      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 3156)
    • Auto-launch of the file from Registry key

      • taskhostw.exe (PID: 4424)
    • RDPWRAP has been detected

      • RDPWInst.exe (PID: 7384)
      • RDPWInst.exe (PID: 8516)
      • attrib.exe (PID: 9212)
    • Compiled with Borland Delphi (YARA)

      • rfusclient.exe (PID: 1096)
      • rutserv.exe (PID: 5380)
      • rfusclient.exe (PID: 6080)
    • Aspack has been detected

      • rutserv.exe (PID: 5380)
      • rfusclient.exe (PID: 6080)
      • rfusclient.exe (PID: 1096)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:04:17 20:18:02
ZipCRC: 0xeb5652a2
ZipCompressedSize: 10085647
ZipUncompressedSize: 10508800
ZipFileName: Azorult.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
618
Monitored processes
477
Malicious processes
34
Suspicious processes
16

Behavior graph

Click at the process to see the details
start winrar.exe azorult.exe no specs azorult.exe shellexperiencehost.exe no specs wini.exe wscript.exe no specs winit.exe cmd.exe no specs conhost.exe no specs #RMS regedit.exe no specs #RMS regedit.exe no specs timeout.exe no specs rutserv.exe no specs rutserv.exe no specs rutserv.exe no specs #RMS rutserv.exe #RMS rfusclient.exe no specs #RMS rfusclient.exe no specs attrib.exe no specs attrib.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs cheat.exe taskhost.exe p.exe ink.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs rfusclient.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs svchost.exe cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs icacls.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs icacls.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs r8.exe cmd.exe no specs conhost.exe no specs wscript.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs winlog.exe cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs winlogon.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs chcp.com no specs rar.exe powershell.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs taskkill.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs wscript.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs taskhostw.exe reg.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs icacls.exe no specs icacls.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs icacls.exe no specs chcp.com no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs THREAT rdpwinst.exe schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs winlogon.exe no specs cmd.exe no specs conhost.exe no specs taskhostw.exe no specs schtasks.exe no specs slui.exe winlogon.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs netsh.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs rdpwinst.exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs ipconfig.exe no specs gpupdate.exe no specs reg.exe no specs net.exe no specs net1.exe no specs attrib.exe no specs attrib.exe no specs attrib.exe no specs timeout.exe no specs taskkill.exe no specs taskkill.exe no specs attrib.exe no specs taskhostw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208net localgroup "Пользователи удаленного рабочего стола" John /addC:\Windows\SysWOW64\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
616"C:\ProgramData\Windows\winit.exe" C:\ProgramData\Windows\winit.exe
wini.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\programdata\windows\winit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
664\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
672\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
732\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
732C:\WINDOWS\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny %username%:(OI)(CI)(F)C:\Windows\SysWOW64\cmd.exeAzorult.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
732\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
744C:\WINDOWS\system32\net1 localgroup "Remote Desktop Users" John /addC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
744C:\WINDOWS\system32\cmd.exe /C schtasks /Delete /TN "Mozilla\Firefox Default Browser Agent 308046B0AF4A39CB" /FC:\Windows\SysWOW64\cmd.exewinlogon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
872icacls "C:\Program Files\ESET" /deny admin:(OI)(CI)(F)C:\Windows\SysWOW64\icacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
45 086
Read events
44 821
Write events
186
Delete events
79

Modification events

(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\AzorultExecutor.zip
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1660) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5376) Azorult.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Operation:writeName:John
Value:
0
(PID) Process:(5376) Azorult.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
Operation:writeName:John
Value:
0
Executable files
24
Suspicious files
12
Text files
22
Unknown types
0

Dropped files

PID
Process
Filename
Type
5376Azorult.exeC:\ProgramData\Microsoft\Check\Check.txt
MD5:
SHA256:
5376Azorult.exeC:\ProgramData\Microsoft\temp\Clean.battext
MD5:041E144A6429A6926771B0469B901630
SHA256:1134B862F4D0CE10466742BEB334C06C2386E85ACAD72725DDB1CECB1871B312
5376Azorult.exeC:\ProgramData\Microsoft\temp\5.xmltext
MD5:487497F0FAACCBF26056D9470EB3ECED
SHA256:9A8EFBD09C9CC1EE7E8FF76EA60846B5CD5A47CDAAE8E92331F3B7B6A5DB4BE5
5376Azorult.exeC:\Users\admin\AppData\Local\Temp\aut29EC.tmpbinary
MD5:0E65104906591BA1FAB714B173A460FB
SHA256:83B28E026DE4CE5588039491968A4E360C7334CEEAFC0E64A63BB19EFDE7F985
5376Azorult.exeC:\Users\admin\AppData\Local\Temp\aut29ED.tmpbinary
MD5:5404EFC351CB385071F39AA5C8E466BF
SHA256:F8556F9FC9ED0A3B54EB475A12B0FAD77B9BA5EA26761F0795440741F6B40C55
5376Azorult.exeC:\Users\admin\AppData\Local\Temp\aut29DC.tmpbinary
MD5:7B5818F70DA8C573F74BE380A6658570
SHA256:7985A07B0E5795C7DFAC7489B91A9B15CE9C0534DA1FFC2AE385F9FCAEFE92AB
6592wini.exeC:\ProgramData\Windows\install.battext
MD5:DB76C882184E8D2BAC56865C8E88F8FD
SHA256:E3DB831CDB021D6221BE26A36800844E9AF13811BAC9E4961AC21671DFF9207A
5376Azorult.exeC:\Users\admin\AppData\Local\Temp\aut29FF.tmpexecutable
MD5:F9A9B17C831721033458D59BF69F45B6
SHA256:9276D1BB2CD48FDF46161DEAF7AD4B0DBCEF9655D462584E104BD3F2A8C944CE
6592wini.exeC:\ProgramData\Windows\winit.exeexecutable
MD5:03A781BB33A21A742BE31DEB053221F3
SHA256:E95FC3E7ED9EC61BA7214CC3FE5D869E2EE22ABBEAC3052501813BB2B6DDE210
6592wini.exeC:\ProgramData\Windows\rutserv.exeexecutable
MD5:37A8802017A212BB7F5255ABC7857969
SHA256:1699B9B4FC1724F9B0918B57CA58C453829A3935EFD89BD4E9FA66B5E9F2B8A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
63
DNS requests
28
Threats
19

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
2148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2148
SIHClient.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
40.69.42.241:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
2148
SIHClient.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
GET
304
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
2148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2148
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted
2148
SIHClient.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2148
SIHClient.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2148
SIHClient.exe
40.69.42.241:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5380
rutserv.exe
77.223.119.187:5655
rms-server.tektonit.ru
OOO Network of data-centers Selectel
RU
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 216.58.212.174
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
rms-server.tektonit.ru
  • 77.223.119.187
unknown
boglogov.site
unknown
ip-api.com
  • 208.95.112.1
whitelisted

Threats

PID
Process
Class
Message
5380
rutserv.exe
Potential Corporate Privacy Violation
REMOTE [ANY.RUN] Remote Access Tool Has been detected
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
616
winit.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
616
winit.exe
Potential Corporate Privacy Violation
ET INFO Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
2196
svchost.exe
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in DNS Lookup)
5376
Azorult.exe
Potential Corporate Privacy Violation
ET INFO IP Check Domain (iplogger .org in TLS SNI)
Potentially Bad Traffic
ET INFO RDP Wrapper Download (ini)
Potential Corporate Privacy Violation
ET INFO Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
Process
Message
rutserv.exe
TMainService.Start
rutserv.exe
GUID_CONSOLE_DISPLAY_STATE
rutserv.exe
18-04-2025_05:01:20:370#T:Msg Size: 104
rutserv.exe
18-04-2025_05:01:20:370#T:MSG_KEEP_ALIVE
rutserv.exe
18-04-2025_05:01:20:370#T:Msg code: 3
rutserv.exe
MSG_KEEP_ALIVE
rutserv.exe
MSG_KEEP_ALIVE
rutserv.exe
18-04-2025_05:01:47:761#T:Msg code: 3
rutserv.exe
18-04-2025_05:01:47:761#T:Msg Size: 104
rutserv.exe
18-04-2025_05:01:47:761#T:MSG_KEEP_ALIVE