URL:

https://dropmefiles.com/MrbT5

Full analysis: https://app.any.run/tasks/258232b9-c7bb-485f-8c07-272a963ead3e
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: February 26, 2025, 06:55:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
remote
xworm
Indicators:
MD5:

9A5F5B10A569FF9CC27AB8A820A9B112

SHA1:

670F96FBB5583725D25AD6E93A2A361A30AB63FF

SHA256:

E96E15C16F90178827D6E09D1A623C028FCD735424E68E12009FDEFCE4EE85C6

SSDEEP:

3:N8PKV9DNtQ:2oDNi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • XClient.exe (PID: 7964)
    • Changes powershell execution policy (Bypass)

      • XClient.exe (PID: 7964)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7472)
      • powershell.exe (PID: 8028)
      • powershell.exe (PID: 628)
      • powershell.exe (PID: 7408)
    • Adds process to the Windows Defender exclusion list

      • XClient.exe (PID: 7964)
    • XWORM has been detected (YARA)

      • XClient.exe (PID: 7964)
    • Uses Task Scheduler to run other applications

      • XClient.exe (PID: 7964)
    • Create files in the Startup directory

      • XClient.exe (PID: 7964)
    • Changes the autorun value in the registry

      • XClient.exe (PID: 7964)
    • XWORM has been detected (SURICATA)

      • XClient.exe (PID: 7964)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7916)
      • XClient.exe (PID: 7964)
    • Application launched itself

      • WinRAR.exe (PID: 7916)
    • Checks for external IP

      • XClient.exe (PID: 7964)
    • Reads the date of Windows installation

      • XClient.exe (PID: 7964)
    • Script adds exclusion path to Windows Defender

      • XClient.exe (PID: 7964)
    • Starts POWERSHELL.EXE for commands execution

      • XClient.exe (PID: 7964)
    • Executable content was dropped or overwritten

      • XClient.exe (PID: 7964)
    • Connects to unusual port

      • XClient.exe (PID: 7964)
    • Script adds exclusion process to Windows Defender

      • XClient.exe (PID: 7964)
    • Contacting a server suspected of hosting an CnC

      • XClient.exe (PID: 7964)
    • The process executes via Task Scheduler

      • XClient.exe (PID: 6916)
      • XClient.exe (PID: 2756)
      • XClient.exe (PID: 8116)
      • XClient.exe (PID: 5876)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 6788)
      • XClient.exe (PID: 7964)
      • XClient.exe (PID: 6916)
      • XClient.exe (PID: 8116)
      • XClient.exe (PID: 2756)
      • XClient.exe (PID: 5876)
    • Reads Environment values

      • identity_helper.exe (PID: 6788)
      • XClient.exe (PID: 7964)
    • Manual execution by a user

      • XClient.exe (PID: 7964)
      • WINWORD.EXE (PID: 3664)
    • Reads the computer name

      • identity_helper.exe (PID: 6788)
      • XClient.exe (PID: 7964)
      • XClient.exe (PID: 6916)
      • XClient.exe (PID: 8116)
      • XClient.exe (PID: 2756)
      • XClient.exe (PID: 5876)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 4652)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 8008)
      • msedge.exe (PID: 3052)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7472)
      • powershell.exe (PID: 7408)
      • powershell.exe (PID: 8028)
      • powershell.exe (PID: 628)
    • Disables trace logs

      • XClient.exe (PID: 7964)
    • Reads the machine GUID from the registry

      • XClient.exe (PID: 7964)
      • XClient.exe (PID: 6916)
      • XClient.exe (PID: 8116)
      • XClient.exe (PID: 2756)
      • XClient.exe (PID: 5876)
    • Process checks computer location settings

      • XClient.exe (PID: 7964)
    • Checks proxy server information

      • XClient.exe (PID: 7964)
    • Application launched itself

      • msedge.exe (PID: 4652)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7408)
      • powershell.exe (PID: 8028)
      • powershell.exe (PID: 628)
      • powershell.exe (PID: 7472)
    • Creates files or folders in the user directory

      • XClient.exe (PID: 7964)
    • Create files in a temporary directory

      • XClient.exe (PID: 7964)
    • The sample compiled with english language support

      • msedge.exe (PID: 3052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(7964) XClient.exe
C2127.0.0.1,tcp-free.tunnel4.com:32771
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWorm V5.6
Mutex3pxKusHIEQdZ2UGN
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
221
Monitored processes
81
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs Set Network Location Elevated Virtual Factory no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winrar.exe no specs winrar.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs #XWORM xclient.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs xclient.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winword.exe ai.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs xclient.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs xclient.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs xclient.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
628"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeXClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
628"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5976 --field-trial-handle=2344,i,12953046255352562461,4403632691769073588,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
716"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x300,0x304,0x308,0x2f8,0x310,0x7ff821bf5fd8,0x7ff821bf5fe4,0x7ff821bf5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
932"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5848 --field-trial-handle=2344,i,12953046255352562461,4403632691769073588,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1520"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5824 --field-trial-handle=2344,i,12953046255352562461,4403632691769073588,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1740"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5596 --field-trial-handle=2344,i,12953046255352562461,4403632691769073588,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
1864"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5904 --field-trial-handle=2344,i,12953046255352562461,4403632691769073588,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2076"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3684 --field-trial-handle=2344,i,12953046255352562461,4403632691769073588,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2756"C:\Users\admin\AppData\Roaming\XClient.exe"C:\Users\admin\AppData\Roaming\XClient.exesvchost.exe
User:
admin
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\xclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
48 379
Read events
47 916
Write events
434
Delete events
29

Modification events

(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4652) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
4795DA589C8D2F00
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328448
Operation:writeName:WindowTabManagerFileMappingId
Value:
{7B6A7B9F-71CB-4F9A-AC0C-FB1783D6DBAE}
(PID) Process:(4652) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328448
Operation:writeName:WindowTabManagerFileMappingId
Value:
{A54DCAA3-4484-4B2F-840C-745E80AD1B40}
(PID) Process:(4652) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
68D3DF589C8D2F00
(PID) Process:(2192) svchost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dnscache\Parameters\Probe\{e1a5a028-501a-4656-8ee6-50672c8c1385}
Operation:writeName:LastProbeTime
Value:
(PID) Process:(2192) svchost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Dnscache\Parameters\Probe\{e1a5a028-501a-4656-8ee6-50672c8c1385}
Operation:writeName:NetworkPerformsHijacking
Value:
0
Executable files
55
Suspicious files
705
Text files
125
Unknown types
0

Dropped files

PID
Process
Filename
Type
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF134a4b.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF134a5a.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF134a5a.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF134a4b.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF134a89.TMP
MD5:
SHA256:
4652msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
33
TCP/UDP connections
162
DNS requests
115
Threats
25

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.198.57:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7564
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2200
svchost.exe
GET
206
23.48.23.27:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fb6dd03b-99d7-4cc8-a878-91c8e655c2d3?P1=1741079405&P2=404&P3=2&P4=nmy3028E1YevZHpylGmZGl05Ife2P%2fwLYqLNTMRQr64B21wherIBpdnAsCdxfRYi5kIGqenM5ok4XmU4PFIQxw%3d%3d
unknown
whitelisted
2200
svchost.exe
GET
206
23.48.23.27:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fb6dd03b-99d7-4cc8-a878-91c8e655c2d3?P1=1741079405&P2=404&P3=2&P4=nmy3028E1YevZHpylGmZGl05Ife2P%2fwLYqLNTMRQr64B21wherIBpdnAsCdxfRYi5kIGqenM5ok4XmU4PFIQxw%3d%3d
unknown
whitelisted
2200
svchost.exe
HEAD
200
23.48.23.27:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/fb6dd03b-99d7-4cc8-a878-91c8e655c2d3?P1=1741079405&P2=404&P3=2&P4=nmy3028E1YevZHpylGmZGl05Ife2P%2fwLYqLNTMRQr64B21wherIBpdnAsCdxfRYi5kIGqenM5ok4XmU4PFIQxw%3d%3d
unknown
whitelisted
5592
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2200
svchost.exe
GET
206
23.48.23.27:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/5cbc98ff-b69b-4fda-ad94-17ec2f9cf48b?P1=1741086606&P2=404&P3=2&P4=LSuq9bTbIwSHhVvwdzFMBzQT3g0i9FCrsuc%2b3i6CxLI6B5B3H%2fXRzDiPvBxRZ7O0HQSN9PMGUowzcNsR1jyUDA%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3540
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2324
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4652
msedge.exe
239.255.255.250:1900
whitelisted
6308
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6308
msedge.exe
176.99.128.9:443
dropmefiles.com
Inetcom LLC
RU
whitelisted
6308
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6308
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6308
msedge.exe
13.107.253.44:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.206
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
dropmefiles.com
  • 176.99.128.9
  • 176.99.128.18
  • 176.99.128.38
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.253.44
whitelisted
bzib.nelreports.net
  • 23.48.23.51
  • 23.48.23.26
whitelisted
www.bing.com
  • 184.86.251.6
  • 184.86.251.4
  • 184.86.251.13
  • 184.86.251.10
  • 184.86.251.29
  • 184.86.251.30
  • 184.86.251.12
  • 184.86.251.8
  • 184.86.251.15
whitelisted
imasdk.googleapis.com
  • 142.250.181.234
whitelisted

Threats

PID
Process
Class
Message
6308
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Service Domain in DNS Lookup (dropmefiles .com)
6308
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Service Domain in DNS Lookup (dropmefiles .com)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING Observed File Sharing Service Domain (dropmefiles .com in TLS SNI)
6308
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Service Domain in DNS Lookup (dropmefiles .com)
Process
Message
XClient.exe
Thread was being aborted.
XClient.exe
Thread was being aborted.
XClient.exe
Thread was being aborted.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.