File name:

NjRat0.7D.exe

Full analysis: https://app.any.run/tasks/5d19d088-d7ac-49c3-b2ea-8b7232669abb
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: May 18, 2025, 14:54:39
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
httpdebugger
tool
auto-reg
delphi
netreactor
mpress
auto-startup
remote
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

3E8DC9BA82863BD3C1E5EC769D2C187F

SHA1:

FA80A09B2A6804868C26DBEB62B073D1546A132B

SHA256:

6F4FB430FC36355253EFF73A164D147AD1FA17DC9C62DBA0984D003E1DB74880

SSDEEP:

98304:BmBd+aUrv12au38Dr2JyomxfOYo1XpDy4VekE3PIW+VVWpgrpve1D3fs1WL8vbI+:RWfqiDkNi83lKZa7ebSAHUE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads files via BITSADMIN.EXE

      • wscript.exe (PID: 6048)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 6048)
    • Changes the autorun value in the registry

      • reg.exe (PID: 6576)
      • reg.exe (PID: 6564)
    • Create files in the Startup directory

      • cmd.exe (PID: 4152)
    • XWORM has been detected (SURICATA)

      • InstallUtil.exe (PID: 896)
  • SUSPICIOUS

    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6048)
    • The process executes VB scripts

      • NjRat0.7D.exe (PID: 7152)
    • Executable content was dropped or overwritten

      • NjRat0.7D.exe (PID: 7152)
      • cmd.exe (PID: 4152)
      • Runtime Broker.exe (PID: 4040)
    • Reads security settings of Internet Explorer

      • audiodg.exe (PID: 4892)
      • NjRat0.7D.exe (PID: 7152)
      • WWAHost.exe (PID: 3300)
      • Runtime Broker.exe (PID: 4040)
      • svchost.exe (PID: 4112)
    • Reads the date of Windows installation

      • NjRat0.7D.exe (PID: 7152)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6192)
      • cmd.exe (PID: 1052)
      • cmd.exe (PID: 4152)
      • cmd.exe (PID: 4976)
    • Hides command output

      • cmd.exe (PID: 6192)
      • cmd.exe (PID: 1052)
      • cmd.exe (PID: 4976)
      • cmd.exe (PID: 4152)
    • Starts CMD.EXE for commands execution

      • audiodg.exe (PID: 4892)
      • WWAHost.exe (PID: 3300)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 6192)
      • cmd.exe (PID: 4976)
    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 2984)
      • Runtime Broker.exe (PID: 4040)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2984)
      • cmd.exe (PID: 4152)
    • The executable file from the user directory is run by the CMD process

      • Runtime Broker.exe (PID: 4040)
    • Application launched itself

      • svchost.exe (PID: 4112)
    • Contacting a server suspected of hosting an CnC

      • InstallUtil.exe (PID: 896)
    • Connects to unusual port

      • InstallUtil.exe (PID: 896)
  • INFO

    • Reads the machine GUID from the registry

      • NjRat0.7D.exe (PID: 7152)
      • audiodg.exe (PID: 4892)
      • NjRat 0.7D.exe (PID: 864)
      • WWAHost.exe (PID: 3300)
      • Runtime Broker.exe (PID: 4040)
      • InstallUtil.exe (PID: 896)
      • svchost.exe (PID: 4112)
      • svchost.exe (PID: 900)
    • Checks proxy server information

      • audiodg.exe (PID: 4892)
      • WWAHost.exe (PID: 3300)
      • Runtime Broker.exe (PID: 4040)
      • slui.exe (PID: 6808)
    • Checks supported languages

      • audiodg.exe (PID: 4892)
      • NjRat 0.7D.exe (PID: 864)
      • NjRat0.7D.exe (PID: 7152)
      • WWAHost.exe (PID: 3300)
      • Runtime Broker.exe (PID: 4040)
      • InstallUtil.exe (PID: 896)
      • svchost.exe (PID: 4112)
      • svchost.exe (PID: 900)
    • Create files in a temporary directory

      • NjRat0.7D.exe (PID: 7152)
      • svchost.exe (PID: 4112)
      • Runtime Broker.exe (PID: 4040)
      • svchost.exe (PID: 900)
    • Reads the computer name

      • NjRat0.7D.exe (PID: 7152)
      • audiodg.exe (PID: 4892)
      • NjRat 0.7D.exe (PID: 864)
      • WWAHost.exe (PID: 3300)
      • Runtime Broker.exe (PID: 4040)
      • svchost.exe (PID: 4112)
      • InstallUtil.exe (PID: 896)
      • svchost.exe (PID: 900)
    • Creates files or folders in the user directory

      • NjRat0.7D.exe (PID: 7152)
    • Reads Microsoft Office registry keys

      • NjRat0.7D.exe (PID: 7152)
    • Process checks computer location settings

      • NjRat0.7D.exe (PID: 7152)
      • Runtime Broker.exe (PID: 4040)
      • svchost.exe (PID: 4112)
    • HTTPDEBUGGER has been detected

      • audiodg.exe (PID: 4892)
      • WWAHost.exe (PID: 3300)
      • Runtime Broker.exe (PID: 4040)
    • Auto-launch of the file from Registry key

      • reg.exe (PID: 6576)
      • reg.exe (PID: 6564)
    • .NET Reactor protector has been detected

      • NjRat 0.7D.exe (PID: 864)
    • Mpress packer has been detected

      • NjRat 0.7D.exe (PID: 864)
    • Compiled with Borland Delphi (YARA)

      • NjRat 0.7D.exe (PID: 864)
    • Failed to create an executable file in Windows directory

      • cmd.exe (PID: 1052)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2984)
    • Auto-launch of the file from Startup directory

      • cmd.exe (PID: 4152)
    • Reads the software policy settings

      • slui.exe (PID: 6808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:02 13:32:25+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 9342976
InitializedDataSize: 34304
UninitializedDataSize: -
EntryPoint: 0x8eaf3e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription: NjRat 0.7D.exe
FileVersion: 0,0,0,7
InternalName: NjRat 0.7D.exe
LegalCopyright:
OriginalFileName: NjRat 0.7D.exe
ProductVersion: 0,0,0,7
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
154
Monitored processes
29
Malicious processes
6
Suspicious processes
5

Behavior graph

Click at the process to see the details
start njrat0.7d.exe njrat 0.7d.exe no specs wscript.exe no specs audiodg.exe no specs bitsadmin.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs reg.exe winrar.exe wwahost.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs cmd.exe conhost.exe no specs ping.exe no specs reg.exe ping.exe no specs runtime broker.exe installutil.exe no specs #XWORM installutil.exe slui.exe svchost.exe no specs svchost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
864"C:\Users\admin\AppData\Local\Temp\NjRat 0.7D.exe" C:\Users\admin\AppData\Local\Temp\NjRat 0.7D.exeNjRat0.7D.exe
User:
admin
Integrity Level:
MEDIUM
Version:
0.0.0.7
Modules
Images
c:\users\admin\appdata\local\temp\njrat 0.7d.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
896"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
Runtime Broker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
900"C:\Users\admin\AppData\Local\Temp\svchost.exe" C:\Users\admin\AppData\Local\Temp\svchost.exesvchost.exe
User:
admin
Company:
Astronot plart Company
Integrity Level:
MEDIUM
Description:
Astronot plart
Version:
1.2.3.3
Modules
Images
c:\users\admin\appdata\local\temp\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
1052"cmd" /c ping 127.0.0.1 -n 11 > nul && copy "C:\Users\admin\AppData\Roaming\audiodg.exe" "C:\WINDOWS\Isolation graphique de périphérique audio Windows .exe" && ping 127.0.0.1 -n 11 > nul && "C:\WINDOWS\Isolation graphique de périphérique audio Windows .exe"C:\Windows\SysWOW64\cmd.exeaudiodg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1056ping 127.0.0.1 -n 9 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ws2_32.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2644ping 127.0.0.1 -n 10 C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\ws2_32.dll
2984"C:\Program Files\WinRAR\WinRAR.exe" x -ibck -p987@789//*.$98ù%-+.8426=/* "C:\Users\admin\AppData\Roaming\MicrosoftEdge.rar" "C:\Users\admin\AppData\Roaming"C:\Program Files\WinRAR\WinRAR.exe
wscript.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3300"C:\Users\admin\AppData\Roaming\WWAHost.exe" C:\Users\admin\AppData\Roaming\WWAHost.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WWAHost
Exit code:
0
Version:
10.0.19041.3393
Modules
Images
c:\users\admin\appdata\roaming\wwahost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
9 739
Read events
9 732
Write events
7
Delete events
0

Modification events

(PID) Process:(7152) NjRat0.7D.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(6576) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:audiodg
Value:
C:\WINDOWS\Isolation graphique de périphérique audio Windows .exe
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2984) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6564) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:svchost
Value:
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exe
Executable files
5
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7152NjRat0.7D.exeC:\Users\admin\AppData\Roaming\install.vbstext
MD5:4724C9DCE57BC0472ED610BA16D08894
SHA256:AAF7BDDCA268A157D995DF03454BA4D15DF36C6B717EBC7FB018E3C5101EF2FB
7152NjRat0.7D.exeC:\Users\admin\AppData\Local\Temp\NjRat 0.7D.exeexecutable
MD5:70EA9C044C9A766330D3FE77418244A5
SHA256:B78FB092E151DB613CBA51D7F2532547E48C6F4712809A485F272E2AB55776A5
7152NjRat0.7D.exeC:\Users\admin\AppData\Roaming\audiodg.exeexecutable
MD5:D9DFA8BA182529445890B5021E159B77
SHA256:60DF809A613AAB714E2EDAD3338500A081FBAE866CEE3A4A3113ABED60F5D59F
4040Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\svchost.txttext
MD5:38E20B577B38FECF93E60EDC95319F36
SHA256:1ACAD111C97925BD523DEB657278EA12BCA52308C4350D1FA5B47C81DD1CE2FE
4040Runtime Broker.exeC:\Users\admin\AppData\Local\Temp\svchost.exeexecutable
MD5:0E362E7005823D0BEC3719B902ED6D62
SHA256:2D0DC6216F613AC7551A7E70A798C22AEE8EB9819428B1357E2B8C73BEF905AD
2984WinRAR.exeC:\Users\admin\AppData\Roaming\WWAHost.exeexecutable
MD5:97039EB7C789FD3147F58AD47E2A1EF2
SHA256:CA2542BD00D3AFE663B5FA13CAD8D7F3ED1C1FEC8B26DA94B0B533B080704CEA
4152cmd.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.exeexecutable
MD5:97039EB7C789FD3147F58AD47E2A1EF2
SHA256:CA2542BD00D3AFE663B5FA13CAD8D7F3ED1C1FEC8B26DA94B0B533B080704CEA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
67
DNS requests
20
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2432
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2104
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6248
svchost.exe
185.199.111.133:443
raw.githubusercontent.com
FASTLY
US
whitelisted
3812
svchost.exe
239.255.255.250:1900
whitelisted
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
raw.githubusercontent.com
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.108.133
  • 185.199.109.133
whitelisted
login.live.com
  • 20.190.160.4
  • 20.190.160.2
  • 20.190.160.131
  • 20.190.160.20
  • 40.126.32.68
  • 20.190.160.22
  • 40.126.32.76
  • 20.190.160.3
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
  • 20.83.72.98
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
896
InstallUtil.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
No debug info