File name:

Swift.exe

Full analysis: https://app.any.run/tasks/390707e3-d10c-4fa0-8d9a-5198f1c41705
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 29, 2025, 11:34:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
auto-startup
xworm
auto-reg
stealer
remote
umbralstealer
discord
exfiltration
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

D0D72FAB357677326D52226771443ED8

SHA1:

98D0599CC73C28825192BE3F0E670C313C9E62CA

SHA256:

3DE249327FE29B3C86CFFC8BEB92A566D12CC4304EBCA1920D49BB466F415FCF

SSDEEP:

12288:p8UgnC1bKBY5uBvV84a+HHLdMpqsFzm3KUGCWz6Kbxu:p8fC1bcY5uZV8FGdMgspm3KUG4Klu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes Windows Defender settings

      • Umbral.exe (PID: 4244)
    • Adds path to the Windows Defender exclusion list

      • Umbral.exe (PID: 4244)
    • Changes the autorun value in the registry

      • RuntimeBroker.exe (PID: 6576)
    • Create files in the Startup directory

      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 4244)
    • Changes Controlled Folder Access settings

      • powershell.exe (PID: 6592)
    • Changes settings for sending potential threat samples to Microsoft servers

      • powershell.exe (PID: 6592)
    • Changes settings for checking scripts for malicious actions

      • powershell.exe (PID: 6592)
    • Changes settings for reporting to Microsoft Active Protection Service (MAPS)

      • powershell.exe (PID: 6592)
    • Changes settings for protection against network attacks (IPS)

      • powershell.exe (PID: 6592)
    • Changes settings for real-time protection

      • powershell.exe (PID: 6592)
    • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)

      • powershell.exe (PID: 6592)
    • XWORM has been detected (YARA)

      • RuntimeBroker.exe (PID: 6576)
    • Steals credentials from Web Browsers

      • Umbral.exe (PID: 4244)
    • Actions looks like stealing of personal data

      • Umbral.exe (PID: 4244)
    • XWORM has been detected (SURICATA)

      • RuntimeBroker.exe (PID: 6576)
    • UMBRALSTEALER has been detected (SURICATA)

      • Umbral.exe (PID: 4244)
    • Starts CMD.EXE for self-deleting

      • Umbral.exe (PID: 4244)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • Swift.exe (PID: 5048)
      • Umbral.exe (PID: 6800)
    • Reads security settings of Internet Explorer

      • Swift.exe (PID: 5048)
      • Umbral.exe (PID: 6800)
    • Executable content was dropped or overwritten

      • Swift.exe (PID: 5048)
      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 4244)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 6744)
      • WMIC.exe (PID: 5304)
      • WMIC.exe (PID: 6112)
    • Application launched itself

      • Umbral.exe (PID: 6800)
    • Uses WMIC.EXE to obtain Windows Installer data

      • Umbral.exe (PID: 6800)
      • Umbral.exe (PID: 4244)
    • Uses ATTRIB.EXE to modify file attributes

      • Umbral.exe (PID: 4244)
    • Script adds exclusion path to Windows Defender

      • Umbral.exe (PID: 4244)
    • Starts POWERSHELL.EXE for commands execution

      • Umbral.exe (PID: 4244)
    • Checks for external IP

      • Umbral.exe (PID: 6800)
      • svchost.exe (PID: 2196)
      • Umbral.exe (PID: 4244)
      • RuntimeBroker.exe (PID: 6576)
    • Script disables Windows Defender's IPS

      • Umbral.exe (PID: 4244)
    • Script disables Windows Defender's real-time protection

      • Umbral.exe (PID: 4244)
    • Connects to unusual port

      • RuntimeBroker.exe (PID: 6576)
    • Contacting a server suspected of hosting an CnC

      • RuntimeBroker.exe (PID: 6576)
    • Uses WMIC.EXE to obtain operating system information

      • Umbral.exe (PID: 4244)
    • Accesses operating system name via WMI (SCRIPT)

      • WMIC.exe (PID: 2552)
    • Uses WMIC.EXE to obtain computer system information

      • Umbral.exe (PID: 4244)
    • Modifies hosts file to alter network resolution

      • Umbral.exe (PID: 4244)
    • The process connected to a server suspected of theft

      • Umbral.exe (PID: 4244)
    • Uses WMIC.EXE to obtain a list of video controllers

      • Umbral.exe (PID: 4244)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 4608)
    • Starts CMD.EXE for commands execution

      • Umbral.exe (PID: 4244)
  • INFO

    • Checks supported languages

      • RuntimeBroker.exe (PID: 6576)
      • Swift.exe (PID: 5048)
      • Umbral.exe (PID: 6800)
      • Umbral.exe (PID: 4244)
      • RuntimeBroker.exe (PID: 1672)
      • t0iwP.scr (PID: 496)
    • Reads the machine GUID from the registry

      • Swift.exe (PID: 5048)
      • Umbral.exe (PID: 4244)
      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 6800)
      • RuntimeBroker.exe (PID: 1672)
    • Reads the computer name

      • Swift.exe (PID: 5048)
      • Umbral.exe (PID: 6800)
      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 4244)
      • RuntimeBroker.exe (PID: 1672)
      • t0iwP.scr (PID: 496)
    • Creates files or folders in the user directory

      • Swift.exe (PID: 5048)
      • RuntimeBroker.exe (PID: 6576)
    • Process checks computer location settings

      • Swift.exe (PID: 5048)
      • Umbral.exe (PID: 6800)
    • Disables trace logs

      • Umbral.exe (PID: 4244)
      • Umbral.exe (PID: 6800)
      • RuntimeBroker.exe (PID: 6576)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 6744)
      • WMIC.exe (PID: 5304)
      • WMIC.exe (PID: 2552)
      • WMIC.exe (PID: 3620)
      • WMIC.exe (PID: 6112)
      • WMIC.exe (PID: 4608)
    • Reads Environment values

      • Umbral.exe (PID: 6800)
      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 4244)
    • Checks proxy server information

      • Umbral.exe (PID: 6800)
      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 4244)
      • slui.exe (PID: 6824)
    • Reads the software policy settings

      • Umbral.exe (PID: 6800)
      • Umbral.exe (PID: 4244)
      • slui.exe (PID: 6824)
    • Auto-launch of the file from Registry key

      • RuntimeBroker.exe (PID: 6576)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5720)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5720)
      • powershell.exe (PID: 6592)
      • powershell.exe (PID: 6564)
      • powershell.exe (PID: 5800)
    • Creates files in the program directory

      • Umbral.exe (PID: 4244)
    • Auto-launch of the file from Startup directory

      • RuntimeBroker.exe (PID: 6576)
      • Umbral.exe (PID: 4244)
    • Manual execution by a user

      • RuntimeBroker.exe (PID: 1672)
      • t0iwP.scr (PID: 496)
    • Create files in a temporary directory

      • Umbral.exe (PID: 4244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(6576) RuntimeBroker.exe
C2australia-thehun.gl.at.ply.gg:4150
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
Mutexg8dP1MKGORT01bZH
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:29 11:25:40+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 320000
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x5009e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 1.0.0.0
InternalName: Swift.exe
LegalCopyright:
OriginalFileName: Swift.exe
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
35
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start swift.exe #XWORM runtimebroker.exe umbral.exe wmic.exe no specs conhost.exe no specs svchost.exe #UMBRALSTEALER umbral.exe wmic.exe no specs conhost.exe no specs attrib.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs runtimebroker.exe no specs powershell.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs t0iwp.scr no specs wmic.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\t0iwP.scr"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\t0iwP.screxplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\programdata\microsoft\windows\start menu\programs\startup\t0iwp.scr
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
664\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1088\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1228"attrib.exe" +h +s "C:\Users\admin\AppData\Roaming\Umbral.exe"C:\Windows\System32\attrib.exeUmbral.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
1672C:\Users\admin\RuntimeBroker.exeC:\Users\admin\RuntimeBroker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2100\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2552"wmic.exe" os get CaptionC:\Windows\System32\wbem\WMIC.exeUmbral.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
Total events
36 008
Read events
35 993
Write events
15
Delete events
0

Modification events

(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6800) Umbral.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Umbral_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
4
Suspicious files
8
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
5048Swift.exeC:\Users\admin\AppData\Roaming\Umbral.exeexecutable
MD5:31AD98CD734AF237BB88070E292D9129
SHA256:7C93D8533C8DDD5B20E90244CCBE54195B40CC74773154F0D043C07AC978602A
5720powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_m1myzoee.slf.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4244Umbral.exeC:\Windows\System32\drivers\etc\hoststext
MD5:2992FEB95030E84DE4A6D2F432E17E5F
SHA256:5E9F7AAADDAD64848ADC44BD44DE1FFE3E69DFCCDEFF29B58067A7F313EABD2D
6576RuntimeBroker.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnkbinary
MD5:0D820931C49ED9BD2E54989C076E2E3C
SHA256:F60159A846E40B4AF607A65FA701E2D0F4D1CC6E3811A9B64171D49516C540B7
5720powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:B33B938FD2D6D48BEB898AAE6311CE5D
SHA256:09D067C79C56539CCD9BBBEB33A03C2B49D9E538205E0BC0F2C451EBB811818D
5048Swift.exeC:\Users\admin\AppData\Roaming\RuntimeBroker.exeexecutable
MD5:FF43937C50739C049AA9D364CAF7376E
SHA256:C2C778CA54D1BDEBBFFFD0E085E72005FBB81A6EEF4974937270AC055A943AF2
6576RuntimeBroker.exeC:\Users\admin\RuntimeBroker.exeexecutable
MD5:FF43937C50739C049AA9D364CAF7376E
SHA256:C2C778CA54D1BDEBBFFFD0E085E72005FBB81A6EEF4974937270AC055A943AF2
5720powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_mwm22ni2.2ly.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5800powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5udzw43t.1ee.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6592powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_o4efkdov.dup.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
43
TCP/UDP connections
62
DNS requests
23
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
536
RUXIMICS.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6068
svchost.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
204
172.217.16.195:443
https://gstatic.com/generate_204
unknown
6068
svchost.exe
GET
304
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
536
RUXIMICS.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6800
Umbral.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
GET
204
172.217.16.195:443
https://gstatic.com/generate_204
unknown
4244
Umbral.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
6576
RuntimeBroker.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
4244
Umbral.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/?fields=225545
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
536
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
6068
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6068
svchost.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
536
RUXIMICS.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
536
RUXIMICS.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
  • 2.16.164.112
  • 2.16.164.113
whitelisted
gstatic.com
  • 142.250.185.131
whitelisted
www.microsoft.com
  • 2.23.181.156
  • 2.23.246.101
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.128
  • 40.126.32.72
  • 20.190.160.22
  • 20.190.160.14
  • 20.190.160.20
  • 20.190.160.64
  • 20.190.160.66
whitelisted
australia-thehun.gl.at.ply.gg
  • 147.185.221.28
unknown
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
6800
Umbral.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
6800
Umbral.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
4244
Umbral.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
4244
Umbral.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
6576
RuntimeBroker.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
6576
RuntimeBroker.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
2196
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected domain Associated with Malware Distribution (.ply .gg)
2196
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES Tunneling Service in DNS Lookup (* .ply .gg)
No debug info