File name:

Patch by N0lik FL Studio 21.2.2.3914.exe

Full analysis: https://app.any.run/tasks/f90a3a19-706a-42ea-8d22-ea4bb6d9eb50
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: January 07, 2024, 22:39:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
xworm
remote
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

3AE6DF39DA5EAA0D470350566B9B5C69

SHA1:

55B85CF7C3F44F2BADBAC1825A1AE26E9E7BD9B0

SHA256:

906593945CEAAECE7DF24C710A03364A48E8B817C2BE480EFCD4A5B7BD65A7BC

SSDEEP:

6144:UM8PrIbwTLQ/FXI+FCrsQb3P4Rzh6JPlmKqhz:Qj7Q/FXI+FC4uGemNhz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XWORM has been detected (YARA)

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
    • Uses Task Scheduler to run other applications

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
    • Create files in the Startup directory

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
    • Changes the autorun value in the registry

      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
    • Reads settings of System Certificates

      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
  • INFO

    • Checks supported languages

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 1264)
      • XClient.exe (PID: 1792)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
      • Patcher FL.exe (PID: 2532)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 2488)
    • Reads the computer name

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 1264)
      • XClient.exe (PID: 1792)
      • Patcher FL.exe (PID: 2448)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 2488)
      • Patcher FL.exe (PID: 2532)
      • XClient.exe (PID: 2560)
    • Manual execution by a user

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 1264)
      • Patcher FL.exe (PID: 2448)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 2488)
      • Patcher FL.exe (PID: 2532)
      • taskmgr.exe (PID: 2840)
    • Drops the executable file immediately after the start

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
    • Creates files or folders in the user directory

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
    • XWORM has been detected (SURICATA)

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
    • Reads Environment values

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
    • Connects to the CnC server

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
    • Reads the machine GUID from the registry

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 1264)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 1792)
      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 2488)
      • Patcher FL.exe (PID: 2532)
      • XClient.exe (PID: 2560)
    • The process executes via Task Scheduler

      • XClient.exe (PID: 1792)
      • XClient.exe (PID: 2560)
    • Checks for external IP

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
    • Connects to unusual port

      • Patch by N0lik FL Studio 21.2.2.3914.exe (PID: 124)
      • Patcher FL.exe (PID: 2448)
      • XClient.exe (PID: 2560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(124) Patch by N0lik FL Studio 21.2.2.3914.exe
C2127.0.0.1,5.tcp.eu.ngrok.io,0.tcp.eu.ngrok.io,7.tcp.eu.ngrok.io:14762
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop namegroup
MutexR0cBWWO54AG2skxr
(PID) Process(2448) Patcher FL.exe
C2https://pastebin.com/raw/yEFBrPn5:<123456789>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeXWorm V5.2
USB drop nameUSB.exe
Mutexv52xl5ZqMWVDugQX
(PID) Process(2560) XClient.exe
C2https://pastebin.com/raw/yEFBrPn5:<123456789>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeXWorm V5.2
USB drop nameUSB.exe
Mutexv52xl5ZqMWVDugQX
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:07 15:49:35+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 70144
InitializedDataSize: 102912
UninitializedDataSize: -
EntryPoint: 0x1303e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: 2XClient.exe
LegalCopyright:
OriginalFileName: 2XClient.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
11
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XWORM patch by n0lik fl studio 21.2.2.3914.exe schtasks.exe no specs patch by n0lik fl studio 21.2.2.3914.exe no specs xclient.exe no specs #XWORM patcher fl.exe schtasks.exe no specs #XWORM xclient.exe schtasks.exe no specs patch by n0lik fl studio 21.2.2.3914.exe no specs patcher fl.exe no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
124"C:\Users\admin\AppData\Local\Temp\Patch by N0lik FL Studio 21.2.2.3914.exe" C:\Users\admin\AppData\Local\Temp\Patch by N0lik FL Studio 21.2.2.3914.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\patch by n0lik fl studio 21.2.2.3914.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
XWorm
(PID) Process(124) Patch by N0lik FL Studio 21.2.2.3914.exe
C2127.0.0.1,5.tcp.eu.ngrok.io,0.tcp.eu.ngrok.io,7.tcp.eu.ngrok.io:14762
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop namegroup
MutexR0cBWWO54AG2skxr
1264"C:\Users\admin\Desktop\Patch by N0lik FL Studio 21.2.2.3914.exe" C:\Users\admin\Desktop\Patch by N0lik FL Studio 21.2.2.3914.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\patch by n0lik fl studio 21.2.2.3914.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1268"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "XClient" /tr "C:\Users\admin\AppData\Roaming\XClient.exe"C:\Windows\System32\schtasks.exeXClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
1792C:\Users\admin\AppData\Roaming\XClient.exe C:\Users\admin\AppData\Roaming\XClient.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\xclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2016"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "XClient" /tr "C:\Users\admin\AppData\Roaming\XClient.exe"C:\Windows\System32\schtasks.exePatch by N0lik FL Studio 21.2.2.3914.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2448"C:\Users\admin\Desktop\Patcher FL.exe" C:\Users\admin\Desktop\Patcher FL.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\patcher fl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
XWorm
(PID) Process(2448) Patcher FL.exe
C2https://pastebin.com/raw/yEFBrPn5:<123456789>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeXWorm V5.2
USB drop nameUSB.exe
Mutexv52xl5ZqMWVDugQX
2488"C:\Users\admin\Desktop\Patch by N0lik FL Studio 21.2.2.3914.exe" C:\Users\admin\Desktop\Patch by N0lik FL Studio 21.2.2.3914.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\patch by n0lik fl studio 21.2.2.3914.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2532"C:\Users\admin\Desktop\Patcher FL.exe" C:\Users\admin\Desktop\Patcher FL.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\patcher fl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2560C:\Users\admin\AppData\Roaming\XClient.exe C:\Users\admin\AppData\Roaming\XClient.exe
taskeng.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\xclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
XWorm
(PID) Process(2560) XClient.exe
C2https://pastebin.com/raw/yEFBrPn5:<123456789>
Keys
AES<Xwormmm>
Options
Splitter3
Sleep timeXWorm V5.2
USB drop nameUSB.exe
Mutexv52xl5ZqMWVDugQX
2624"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "XClient" /tr "C:\Users\admin\AppData\Roaming\XClient.exe"C:\Windows\System32\schtasks.exePatcher FL.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
9 504
Read events
9 448
Write events
56
Delete events
0

Modification events

(PID) Process:(124) Patch by N0lik FL Studio 21.2.2.3914.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(124) Patch by N0lik FL Studio 21.2.2.3914.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(124) Patch by N0lik FL Studio 21.2.2.3914.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(124) Patch by N0lik FL Studio 21.2.2.3914.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2448) Patcher FL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2448) Patcher FL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2448) Patcher FL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2448) Patcher FL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2448) Patcher FL.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:XClient
Value:
C:\Users\admin\AppData\Roaming\XClient.exe
(PID) Process:(2448) Patcher FL.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2448Patcher FL.exeC:\Users\admin\AppData\Roaming\XClient.exeexecutable
MD5:00305C373E1459A1791F8D25D71B7D8D
SHA256:81D25E82CD1F3AAAF1F46128B29C32899FEC873CC93EB35CABC17DB7647372F2
124Patch by N0lik FL Studio 21.2.2.3914.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkbinary
MD5:9A2148183B7EDEC6882E9F5DBBD86C6F
SHA256:19F517F41232D13045AC58E3A2421E46EA36E0646E3BE93BF39DA0BBA92540C4
124Patch by N0lik FL Studio 21.2.2.3914.exeC:\Users\admin\AppData\Roaming\XClient.exeexecutable
MD5:3AE6DF39DA5EAA0D470350566B9B5C69
SHA256:906593945CEAAECE7DF24C710A03364A48E8B817C2BE480EFCD4A5B7BD65A7BC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
124
DNS requests
14
Threats
28

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2448
Patcher FL.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
text
6 b
unknown
124
Patch by N0lik FL Studio 21.2.2.3914.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
text
6 b
unknown
2560
XClient.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
text
6 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
124
Patch by N0lik FL Studio 21.2.2.3914.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
124
Patch by N0lik FL Studio 21.2.2.3914.exe
18.158.249.75:14762
0.tcp.eu.ngrok.io
AMAZON-02
DE
unknown
124
Patch by N0lik FL Studio 21.2.2.3914.exe
3.67.161.133:14762
5.tcp.eu.ngrok.io
AMAZON-02
DE
unknown
2448
Patcher FL.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
2448
Patcher FL.exe
172.67.34.170:443
pastebin.com
CLOUDFLARENET
US
unknown
2448
Patcher FL.exe
3.67.161.133:18532
5.tcp.eu.ngrok.io
AMAZON-02
DE
unknown
2560
XClient.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown

DNS requests

Domain
IP
Reputation
ip-api.com
  • 208.95.112.1
shared
0.tcp.eu.ngrok.io
  • 18.158.249.75
  • 3.125.209.94
malicious
5.tcp.eu.ngrok.io
  • 3.67.161.133
  • 3.127.181.115
  • 18.158.58.205
malicious
pastebin.com
  • 172.67.34.170
  • 104.20.68.143
  • 104.20.67.143
shared
7.tcp.eu.ngrok.io
  • 35.157.111.131
malicious

Threats

PID
Process
Class
Message
124
Patch by N0lik FL Studio 21.2.2.3914.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
124
Patch by N0lik FL Studio 21.2.2.3914.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
124
Patch by N0lik FL Studio 21.2.2.3914.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
1080
svchost.exe
Misc activity
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
124
Patch by N0lik FL Studio 21.2.2.3914.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Xworm Network Packet
1080
svchost.exe
Misc activity
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
1080
svchost.exe
Misc activity
ET INFO DNS Query to a *.ngrok domain (ngrok.io)
2448
Patcher FL.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
2448
Patcher FL.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
2448
Patcher FL.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
4 ETPRO signatures available at the full report
No debug info