File name:

DarkX2.zip

Full analysis: https://app.any.run/tasks/14504709-632e-4e62-a7c0-da49dd274d1a
Verdict: Malicious activity
Analysis date: April 08, 2025, 21:38:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
discord
evasion
arch-exec
ims-api
generic
rust
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

8EF2838AE4FCF08159782EB2F261D2A7

SHA1:

09EB2C36741AA4037A9DD78639C9B6B4A3CB9494

SHA256:

353F0074FB11D0E209E051B186CBB677D5BAAFAADCC5D94E3667572F73DB24A2

SSDEEP:

98304:YRjOzq3idYNB1LGAH7eSdel/U+iqCgXs3ntpJYfdZQH4DkdwMcpl1aJ53MP4vvrT:1CgNHVs+MlEHJVOal/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for external IP

      • darkx-loader.exe (PID: 7904)
      • svchost.exe (PID: 2196)
      • darkx-loader.exe (PID: 8104)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • darkx-loader.exe (PID: 7904)
      • darkx-loader.exe (PID: 8104)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7292)
      • DarkX2.exe (PID: 6032)
    • There is functionality for taking screenshot (YARA)

      • darkx-loader.exe (PID: 7904)
      • darkx-loader.exe (PID: 8104)
    • Application launched itself

      • DarkX2.exe (PID: 6032)
  • INFO

    • Application based on Rust

      • darkx-loader.exe (PID: 7904)
      • darkx-loader.exe (PID: 8104)
    • Checks proxy server information

      • darkx-loader.exe (PID: 7904)
      • darkx-loader.exe (PID: 8104)
      • slui.exe (PID: 2140)
    • Reads the software policy settings

      • darkx-loader.exe (PID: 7904)
      • darkx-loader.exe (PID: 8104)
      • slui.exe (PID: 7500)
      • slui.exe (PID: 2140)
    • Attempting to use instant messaging service

      • svchost.exe (PID: 2196)
    • Reads the computer name

      • darkx-loader.exe (PID: 7904)
      • darkx-loader.exe (PID: 8104)
      • DarkX2.exe (PID: 6032)
      • DarkX2.exe (PID: 920)
      • identity_helper.exe (PID: 7760)
    • Checks supported languages

      • darkx-loader.exe (PID: 8104)
      • darkx-loader.exe (PID: 7904)
      • DarkX2.exe (PID: 6032)
      • DarkX2.exe (PID: 920)
      • identity_helper.exe (PID: 7760)
    • Manual execution by a user

      • Taskmgr.exe (PID: 5156)
      • Taskmgr.exe (PID: 7172)
      • darkx-loader.exe (PID: 8104)
      • DarkX2.exe (PID: 6032)
      • msedge.exe (PID: 2108)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7292)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 5156)
      • OpenWith.exe (PID: 7236)
      • notepad.exe (PID: 7488)
      • WWAHost.exe (PID: 3396)
    • Process checks computer location settings

      • DarkX2.exe (PID: 6032)
    • Reads the machine GUID from the registry

      • DarkX2.exe (PID: 6032)
      • DarkX2.exe (PID: 920)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 7236)
    • Creates files or folders in the user directory

      • WWAHost.exe (PID: 3396)
    • Application launched itself

      • msedge.exe (PID: 2108)
    • Reads Environment values

      • identity_helper.exe (PID: 7760)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(7904) darkx-loader.exe
Discord-Webhook-Tokens (1)1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Discord-Info-Links
1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Get Webhook Infohttps://discord.com/api/webhooks/1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
(PID) Process(8104) darkx-loader.exe
Discord-Webhook-Tokens (1)1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Discord-Info-Links
1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
Get Webhook Infohttps://discord.com/api/webhooks/1267155916109779137/csIK61NTG4-ssAPfbfbDCXNkwA88DElPSHBGSBAAcSBIrrkt30WqcPCr1Ou1grUIH3gc
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:08 23:52:38
ZipCRC: 0xdc47b21b
ZipCompressedSize: 14
ZipUncompressedSize: 14
ZipFileName: PASSWORD: 9982
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
175
Monitored processes
41
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe darkx-loader.exe svchost.exe darkx-loader.exe taskmgr.exe no specs taskmgr.exe slui.exe darkx2.exe no specs darkx2.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wwahost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs openwith.exe no specs notepad.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
920"C:\Users\admin\Desktop\DarkX2.exe" C:\Users\admin\Desktop\DarkX2.exe
DarkX2.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\darkx2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
2108"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=DefaultC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2140C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2332"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6148 --field-trial-handle=2468,i,16593990781958574106,9144267918493322739,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2416"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5052 --field-trial-handle=2468,i,16593990781958574106,9144267918493322739,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3140"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6556 --field-trial-handle=2468,i,16593990781958574106,9144267918493322739,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3396"C:\WINDOWS\system32\wwahost.exe" -ServerName:App.wwaC:\Windows\System32\WWAHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft WWA Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wwahost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
3620"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6392 --field-trial-handle=2468,i,16593990781958574106,9144267918493322739,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3956"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4092 --field-trial-handle=2468,i,16593990781958574106,9144267918493322739,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
14 472
Read events
14 397
Write events
43
Delete events
32

Modification events

(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\DarkX2.zip
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7292) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
Executable files
37
Suspicious files
569
Text files
93
Unknown types
0

Dropped files

PID
Process
Filename
Type
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF12556b.TMP
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF12556b.TMP
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF12556b.TMP
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF12557b.TMP
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old~RF12556b.TMPtext
MD5:C5C8E14929BCE261B2B5B899CB479AF7
SHA256:73DBFF8A366CFF6972A38C091782EF62C89E28FDA1423A47448A60343F921754
7292WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7292.13379\darkx-loader.exeexecutable
MD5:9CC6369458F47950B03647315D5A05E3
SHA256:21E284F6C3C71621CF02CE7DD888B6EB5BC896412FC12E93DEE78870C304C6CE
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF12559a.TMP
MD5:
SHA256:
2108msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
162
DNS requests
104
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7904
darkx-loader.exe
GET
200
208.95.112.1:80
http://208.95.112.1:80/json/
unknown
unknown
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4112
svchost.exe
HEAD
200
151.101.206.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b649b6c2-4484-495a-96f2-2fd1ee2b66ca?P1=1744554828&P2=404&P3=2&P4=ippr0BBDwA%2f0YeFQxVKJ6YY6a7U4IVdMFBYbAfYR0Iw5pGS0vtTIP%2bp1ircU2P6W%2fp2%2f9MpJSGAesKVLf%2bnmYw%3d%3d
unknown
whitelisted
8104
darkx-loader.exe
GET
200
208.95.112.1:80
http://208.95.112.1:80/json/
unknown
unknown
4112
svchost.exe
GET
206
151.101.206.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/b649b6c2-4484-495a-96f2-2fd1ee2b66ca?P1=1744554828&P2=404&P3=2&P4=ippr0BBDwA%2f0YeFQxVKJ6YY6a7U4IVdMFBYbAfYR0Iw5pGS0vtTIP%2bp1ircU2P6W%2fp2%2f9MpJSGAesKVLf%2bnmYw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7904
darkx-loader.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted
7904
darkx-loader.exe
162.159.136.232:443
discord.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.32.238.112
whitelisted
google.com
  • 172.217.23.206
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
discord.com
  • 162.159.136.232
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
dns.google
  • 8.8.8.8
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
ntp.msn.com
  • 204.79.197.203
whitelisted
edge.microsoft.com
  • 150.171.27.11
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2196
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
7904
darkx-loader.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2196
svchost.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
7904
darkx-loader.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
7904
darkx-loader.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
8104
darkx-loader.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
8104
darkx-loader.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
8104
darkx-loader.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
No debug info