File name:

notepad.exe

Full analysis: https://app.any.run/tasks/2b867eda-af60-4a78-849c-dc2f489698d7
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: November 01, 2024, 17:28:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
xworm
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

8E1D6F39C7BCFF12D78528E53B0D56A0

SHA1:

E323E0B2AB6C702FA4FBC3D0D5A982923F57E01E

SHA256:

ED851895646A795F0B55F5D471152AF031987888C3C811C54CC9F12BF5E37643

SSDEEP:

49152:5EvAco7euaJGTIVpiSgtlB1YHAzjqkdq7o2Mm+AN5toDHL5sVJlJmTR6u7mt14MK:uAuLnrlulBMAnqk2aAN5sy/bJ4MBt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • Runtime Broker.exe (PID: 6688)
      • SecurityHealthSystray.exe (PID: 5512)
      • svchost.exe (PID: 5920)
      • WmiPrvSE.exe (PID: 2648)
      • OneDrive.exe (PID: 5580)
      • SearchFilterHost.exe (PID: 5084)
    • XWORM has been detected (YARA)

      • SecurityHealthSystray.exe (PID: 5512)
      • OneDrive.exe (PID: 5580)
      • svchost.exe (PID: 5920)
      • WmiPrvSE.exe (PID: 2648)
      • SearchFilterHost.exe (PID: 5084)
    • XWORM has been detected (SURICATA)

      • Runtime Broker.exe (PID: 6688)
      • SecurityHealthSystray.exe (PID: 5512)
      • OneDrive.exe (PID: 5580)
      • svchost.exe (PID: 5920)
      • WmiPrvSE.exe (PID: 2648)
      • SearchFilterHost.exe (PID: 5084)
    • Connects to the CnC server

      • OneDrive.exe (PID: 5580)
      • svchost.exe (PID: 5920)
      • SearchFilterHost.exe (PID: 5084)
      • Runtime Broker.exe (PID: 6688)
      • SecurityHealthSystray.exe (PID: 5512)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • notepad.exe (PID: 6436)
      • svchost.exe (PID: 7056)
      • WmiPrvSE.exe (PID: 4996)
      • svchost.exe (PID: 1700)
      • WmiPrvSE.exe (PID: 696)
      • svchost.exe (PID: 700)
      • WmiPrvSE.exe (PID: 6740)
    • Process drops legitimate windows executable

      • notepad.exe (PID: 6436)
      • Runtime Broker.exe (PID: 6688)
      • SearchFilterHost.exe (PID: 5084)
      • svchost.exe (PID: 5920)
      • OneDrive.exe (PID: 5580)
      • WmiPrvSE.exe (PID: 2648)
    • Reads the date of Windows installation

      • notepad.exe (PID: 6436)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6436)
    • Executable content was dropped or overwritten

      • notepad.exe (PID: 6436)
      • Runtime Broker.exe (PID: 6688)
      • SearchFilterHost.exe (PID: 5084)
      • WmiPrvSE.exe (PID: 2648)
      • OneDrive.exe (PID: 5580)
      • svchost.exe (PID: 5920)
    • Likely accesses (executes) a file from the Public directory

      • schtasks.exe (PID: 6128)
      • WmiPrvSE.exe (PID: 4996)
      • WmiPrvSE.exe (PID: 696)
      • WmiPrvSE.exe (PID: 6740)
    • The process creates files with name similar to system file names

      • notepad.exe (PID: 6436)
    • The process executes via Task Scheduler

      • SecurityHealthSystray.exe (PID: 6760)
      • svchost.exe (PID: 7056)
      • WmiPrvSE.exe (PID: 4996)
      • OneDrive.exe (PID: 6816)
      • SearchFilterHost.exe (PID: 1764)
      • SecurityHealthSystray.exe (PID: 6164)
      • SearchFilterHost.exe (PID: 7096)
      • svchost.exe (PID: 1700)
      • WmiPrvSE.exe (PID: 696)
      • OneDrive.exe (PID: 6876)
      • SecurityHealthSystray.exe (PID: 6932)
      • SearchFilterHost.exe (PID: 5744)
      • svchost.exe (PID: 700)
      • WmiPrvSE.exe (PID: 6740)
      • OneDrive.exe (PID: 6680)
    • Contacting a server suspected of hosting an CnC

      • SecurityHealthSystray.exe (PID: 5512)
      • Runtime Broker.exe (PID: 6688)
      • WmiPrvSE.exe (PID: 2648)
      • svchost.exe (PID: 5920)
      • SearchFilterHost.exe (PID: 5084)
      • OneDrive.exe (PID: 5580)
    • Checks for external IP

      • svchost.exe (PID: 2172)
      • SecurityHealthSystray.exe (PID: 5512)
      • OneDrive.exe (PID: 5580)
      • svchost.exe (PID: 5920)
      • WmiPrvSE.exe (PID: 2648)
      • SearchFilterHost.exe (PID: 5084)
    • Connects to unusual port

      • SecurityHealthSystray.exe (PID: 5512)
      • Runtime Broker.exe (PID: 6688)
      • SearchFilterHost.exe (PID: 5084)
      • svchost.exe (PID: 5920)
      • WmiPrvSE.exe (PID: 2648)
      • OneDrive.exe (PID: 5580)
  • INFO

    • Checks supported languages

      • notepad.exe (PID: 6436)
      • Runtime Broker.exe (PID: 6688)
    • Process checks computer location settings

      • notepad.exe (PID: 6436)
    • Reads the computer name

      • Runtime Broker.exe (PID: 6688)
      • notepad.exe (PID: 6436)
    • Reads the machine GUID from the registry

      • Runtime Broker.exe (PID: 6688)
      • notepad.exe (PID: 6436)
    • The process uses the downloaded file

      • notepad.exe (PID: 6436)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(6688) Runtime Broker.exe
C283.38.28.117,83.38.24.1:1603
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameaioruntimer
MutexmHOUgq8qHKLibpVt
(PID) Process(5512) SecurityHealthSystray.exe
C283.38.28.117,83.38.24.1:1603
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameaioruntimer
MutexhXHKS5WAWfKbKZ7P
(PID) Process(5580) OneDrive.exe
C283.38.28.117,83.38.24.1:1603
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameaioruntimer
MutexdERfSgZtyKm8xhTC
(PID) Process(2648) WmiPrvSE.exe
C283.38.28.117,83.38.24.1:1603
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameaioruntimer
MutexTZ9ibPZw8BLTUeph
(PID) Process(5920) svchost.exe
C283.38.28.117,83.38.24.1:1603
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameaioruntimer
Mutex4uq64vbKypKYRur8
(PID) Process(5084) SearchFilterHost.exe
C283.38.28.117,83.38.24.1:1603
Keys
AES<123456789>
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameaioruntimer
MutexC6qVALcN529XJint
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:01 17:17:56+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 857088
InitializedDataSize: 104960
UninitializedDataSize: -
EntryPoint: 0xd337e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.2.22621.3672
ProductVersionNumber: 6.2.22621.3672
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Bloc de notas
FileVersion: 6.2.22621.3672
InternalName: notepad.exe
LegalCopyright: © Microsoft Corporation. Todos los derechos reservados.
OriginalFileName: notepad.exe
ProductName: Sistema operativo Microsoft® Windows®
ProductVersion: 6.2.22621.3672
AssemblyVersion: 6.2.22621.3672
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
35
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start notepad.exe #XWORM runtime broker.exe #XWORM securityhealthsystray.exe #XWORM onedrive.exe #XWORM wmiprvse.exe #XWORM svchost.exe #XWORM searchfilterhost.exe schtasks.exe no specs conhost.exe no specs svchost.exe schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs securityhealthsystray.exe no specs searchfilterhost.exe no specs svchost.exe no specs wmiprvse.exe no specs onedrive.exe no specs securityhealthsystray.exe no specs searchfilterhost.exe no specs svchost.exe no specs wmiprvse.exe no specs onedrive.exe no specs securityhealthsystray.exe no specs searchfilterhost.exe no specs svchost.exe no specs wmiprvse.exe no specs onedrive.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
696"C:\Users\Public\WmiPrvSE.exe"C:\Users\Public\WmiPrvSE.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Provider Host
Exit code:
0
Version:
6.2.22621.1
Modules
Images
c:\users\public\wmiprvse.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
700"C:\Users\admin\AppData\Local\Temp\svchost.exe"C:\Users\admin\AppData\Local\Temp\svchost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Proceso host para los servicios de Windows
Version:
6.2.22621.1
Modules
Images
c:\users\admin\appdata\local\temp\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
864"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "Runtime Broker" /tr "C:\ProgramData\Runtime Broker.exe"C:\Windows\System32\schtasks.exeRuntime Broker.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1452"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "OneDrive" /tr "C:\ProgramData\OneDrive.exe"C:\Windows\System32\schtasks.exeOneDrive.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1700"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "SearchFilterHost" /tr "C:\ProgramData\SearchFilterHost.exe"C:\Windows\System32\schtasks.exeSearchFilterHost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1700"C:\Users\admin\AppData\Local\Temp\svchost.exe"C:\Users\admin\AppData\Local\Temp\svchost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Proceso host para los servicios de Windows
Exit code:
0
Version:
6.2.22621.1
Modules
Images
c:\users\admin\appdata\local\temp\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1712"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\admin\SecurityHealthSystray.exe"C:\Windows\System32\schtasks.exeSecurityHealthSystray.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1764"C:\ProgramData\SearchFilterHost.exe"C:\ProgramData\SearchFilterHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Windows Search Filter Host
Exit code:
0
Version:
7.0.22621.4036
Modules
Images
c:\programdata\searchfilterhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2236\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
11 360
Read events
11 298
Write events
62
Delete events
0

Modification events

(PID) Process:(6688) Runtime Broker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Runtime Broker
Value:
C:\ProgramData\Runtime Broker.exe
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5512) SecurityHealthSystray.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecurityHealthSystray_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
11
Suspicious files
0
Text files
0
Unknown types
6

Dropped files

PID
Process
Filename
Type
6436notepad.exeC:\Users\admin\svchost.exeexecutable
MD5:87850C0A72489FC20A7A210BB8A30DF9
SHA256:D79114C41574F0A8927C21EFF73D447306ADA044DE598ADF80B3DAD4E93B91A2
6436notepad.exeC:\Users\admin\Runtime Broker.exeexecutable
MD5:5503C2EEDF90491D65D8FED8E3C954D7
SHA256:CF2A01851B97E40C8E65F24E69A2E897E6D290052B96DA3C2CD4E019D021411F
6436notepad.exeC:\Users\admin\OneDrive.exeexecutable
MD5:22B9BDAC6F8A9AB06580A6F3C5857F2A
SHA256:25A271D4A906AB3528F6C5E2C9457338AFDE35B7DFEB68C4E5F67CDB64EC4430
6436notepad.exeC:\Users\admin\SecurityHealthSystray.exeexecutable
MD5:0FC27CBA8E7F8FEF02CC81E1B1F98CA6
SHA256:6206209CAB4008C31CA1920E82638595EE7F3DC47871CDD2EBA414C6E060D1E8
6436notepad.exeC:\Users\admin\SearchFilterHost.exeexecutable
MD5:9213AAFB0DF7C6B5334D5D264175EF02
SHA256:21019920BB8C65741D72B19AA674F3B8C74BD9ABA55FF1AD50900849AFF59300
5920svchost.exeC:\Users\admin\AppData\Local\Temp\svchost.exeexecutable
MD5:87850C0A72489FC20A7A210BB8A30DF9
SHA256:D79114C41574F0A8927C21EFF73D447306ADA044DE598ADF80B3DAD4E93B91A2
2648WmiPrvSE.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WmiPrvSE.lnklnk
MD5:514EE2AED4B4EA09E096F3AC9EF2CD7A
SHA256:18967F4EED7EE1637596F0B3D7B9F76C1FD4186ED75EB3E4A20A29BB9D70320B
6688Runtime Broker.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Runtime Broker.lnklnk
MD5:080062BFF9D2BF82AA08F890448431F8
SHA256:653C320A7070702D8D5D9C38CB443B10C2A36080F1CC0954C0B02B825B40E516
2648WmiPrvSE.exeC:\Users\Public\WmiPrvSE.exeexecutable
MD5:1CAE3EA6545B01226B1CF980963AEA01
SHA256:39B765D25D92E01C3E79AD097E974B79AA93CF22EB492E7BA57C00CC3E228BD2
5084SearchFilterHost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SearchFilterHost.lnklnk
MD5:F462AD3597C6549058C4433DB601B8B8
SHA256:B5643AFD38D27EE42A44B29BAF4FAF7D79A341F3B54B540C3CA60C010206F68B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
11
Threats
177

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5920
svchost.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
2648
WmiPrvSE.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
5512
SecurityHealthSystray.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
5084
SearchFilterHost.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
5580
OneDrive.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5488
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.155
  • 104.126.37.145
  • 104.126.37.139
  • 104.126.37.154
  • 104.126.37.152
  • 104.126.37.153
  • 104.126.37.146
  • 104.126.37.160
  • 104.126.37.144
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ip-api.com
  • 208.95.112.1
shared
self.events.data.microsoft.com
  • 52.182.143.213
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2172
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
5084
SearchFilterHost.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
5920
svchost.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
5084
SearchFilterHost.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
5920
svchost.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
5512
SecurityHealthSystray.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2648
WmiPrvSE.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
5512
SecurityHealthSystray.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
5580
OneDrive.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
156 ETPRO signatures available at the full report
No debug info