File name:

rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015

Full analysis: https://app.any.run/tasks/d7a315ca-18bb-4643-8ab8-6057c924eb88
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: July 06, 2025, 05:13:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
auto-reg
auto-startup
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

71BC1EAE25CF249A565579D41F76BCE6

SHA1:

F72522E2E319C982956D5A80D83E9B97009E64E7

SHA256:

F08F77C93C18F55C22C54418B22C4E658D1272F838572A2063796545BE6D2015

SSDEEP:

196608:NsnMUkXxE8/53m33z2GIhAo7jfYLEUK5i29:qn6BE853m33iGmA7ED

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • XWORM.exe (PID: 4984)
    • Changes the autorun value in the registry

      • XWORM.exe (PID: 4984)
    • Create files in the Startup directory

      • XWORM.exe (PID: 4984)
    • XWORM has been detected (YARA)

      • XWORM.exe (PID: 4984)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Reads security settings of Internet Explorer

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Executable content was dropped or overwritten

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Reads the date of Windows installation

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Checks for external IP

      • XWORM.exe (PID: 4984)
      • svchost.exe (PID: 2200)
    • There is functionality for taking screenshot (YARA)

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Connects to unusual port

      • XWORM.exe (PID: 4984)
    • The process executes via Task Scheduler

      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
  • INFO

    • Reads the computer name

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
    • Process checks computer location settings

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Checks supported languages

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
      • XWORM.exe (PID: 4984)
    • Create files in a temporary directory

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Reads the machine GUID from the registry

      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
    • Checks proxy server information

      • XWORM.exe (PID: 4984)
      • slui.exe (PID: 6756)
    • Disables trace logs

      • XWORM.exe (PID: 4984)
    • Launching a file from a Registry key

      • XWORM.exe (PID: 4984)
    • Creates files or folders in the user directory

      • XWORM.exe (PID: 4984)
    • Launching a file from the Startup directory

      • XWORM.exe (PID: 4984)
    • Manual execution by a user

      • RuntimeBroker.exe (PID: 2996)
    • Reads the software policy settings

      • slui.exe (PID: 6756)
    • Reads Environment values

      • XWORM.exe (PID: 4984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(4984) XWORM.exe
C2dudn.xyz:1000
Keys
AESHORIZON
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWORM 5.6
Mutexpj9NHo2Srl3u3xXq
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:20 10:01:29+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 307200
InitializedDataSize: 252928
UninitializedDataSize: -
EntryPoint: 0x32690
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe #XWORM xworm.exe svchost.exe schtasks.exe no specs conhost.exe no specs runtimebroker.exe no specs slui.exe runtimebroker.exe no specs runtimebroker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1216\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2044"C:\Users\admin\Desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe" C:\Users\admin\Desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2996C:\Users\admin\AppData\Roaming\RuntimeBroker.exeC:\Users\admin\AppData\Roaming\RuntimeBroker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3936"C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\admin\AppData\Roaming\RuntimeBroker.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4984"C:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exe
rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\xworm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(4984) XWORM.exe
C2dudn.xyz:1000
Keys
AESHORIZON
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWORM 5.6
Mutexpj9NHo2Srl3u3xXq
6292"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Windows\System32\schtasks.exeXWORM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6380"C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\admin\AppData\Roaming\RuntimeBroker.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6756C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
5 741
Read events
5 726
Write events
15
Delete events
0

Modification events

(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
51
Suspicious files
5
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\XWormm.exeexecutable
MD5:B617A5DEB678D11F6437F41FD0EA3A2E
SHA256:D4E2FC220FF2B731B6BD8A3EBB4E92B86AAD8BC8E1A8336D1405480214EE74F3
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (3).icoimage
MD5:A512719EFC9E6ECC5E2375ABCEB1669A
SHA256:B2F7FB22CD5B935CF19A2F58F7FEF9DB99DB40772FF4BB331A73C345161C2574
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (12).icoimage
MD5:4EA9AB789F5AE96766E3F64C8A4E2480
SHA256:84B48CA52DFCD7C74171CF291D2EF1247C3C7591A56B538083834D82857FEE50
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (13).icoimage
MD5:E6FEC4185B607E01A938FA405E0A6C6C
SHA256:2E2F17B7DD15007192E7CBBD0019355F8BE58068DC5042323123724B99AE4B44
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (10).icoimage
MD5:AD1740CB3317527AA1ACAE6E7440311E
SHA256:7A97547954AAAD629B0563CC78BCA75E3339E8408B70DA2ED67FA73B4935D878
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\SimpleObfuscator.dllexecutable
MD5:9043D712208178C33BA8E942834CE457
SHA256:B7A6EEA19188B987DAD97B32D774107E9A1BEB4F461A654A00197D73F7FAD54C
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (15).icoimage
MD5:E3143E8C70427A56DAC73A808CBA0C79
SHA256:B2F57A23ECC789C1BBF6037AC0825BF98BABC7BF0C5D438AF5E2767A27A79188
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (6).icoimage
MD5:D7C9666D30936E29CE156A2E04807863
SHA256:6EA04CF08751A2F6BB2F0E994258A44D5183B6CDB1471A0EE285659EADA045B5
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (14).icoimage
MD5:0C24EDEC606ABDA7C6570B7DCF439298
SHA256:8FC693238AFC49A8098DAC1762BFAE891E818BB84749C6EEF5F1B0C6C8FFDDB2
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (7).icoimage
MD5:7891C91D1761DC8A8846D362E6E31869
SHA256:29D38C75AF79AA0554F34CDFECB311F88F8DD02B02FACAA299B9700841806AB8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
24
DNS requests
9
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6404
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4984
XWORM.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6404
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6404
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.110
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
dudn.xyz
  • 45.201.0.222
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 20.189.173.17
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2200
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
4984
XWORM.exe
A Network Trojan was detected
ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com
4984
XWORM.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
4984
XWORM.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
No debug info