File name:

rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015

Full analysis: https://app.any.run/tasks/d7a315ca-18bb-4643-8ab8-6057c924eb88
Verdict: Malicious activity
Threats:

XWorm is a remote access trojan (RAT) sold as a malware-as-a-service. It possesses an extensive hacking toolset and is capable of gathering private information and files from the infected computer, hijacking MetaMask and Telegram accounts, and tracking user activity. XWorm is typically delivered to victims' computers through multi-stage attacks that start with phishing emails.

Analysis date: July 06, 2025, 05:13:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
auto-reg
auto-startup
xworm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

71BC1EAE25CF249A565579D41F76BCE6

SHA1:

F72522E2E319C982956D5A80D83E9B97009E64E7

SHA256:

F08F77C93C18F55C22C54418B22C4E658D1272F838572A2063796545BE6D2015

SSDEEP:

196608:NsnMUkXxE8/53m33z2GIhAo7jfYLEUK5i29:qn6BE853m33iGmA7ED

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • XWORM.exe (PID: 4984)
    • Create files in the Startup directory

      • XWORM.exe (PID: 4984)
    • XWORM has been detected (YARA)

      • XWORM.exe (PID: 4984)
    • Changes the autorun value in the registry

      • XWORM.exe (PID: 4984)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • The process creates files with name similar to system file names

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Executable content was dropped or overwritten

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Reads the date of Windows installation

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Checks for external IP

      • XWORM.exe (PID: 4984)
      • svchost.exe (PID: 2200)
    • Connects to unusual port

      • XWORM.exe (PID: 4984)
    • There is functionality for taking screenshot (YARA)

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • The process executes via Task Scheduler

      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
  • INFO

    • Reads the computer name

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
    • Create files in a temporary directory

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
    • Process checks computer location settings

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
    • Checks supported languages

      • rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe (PID: 2044)
      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 3936)
    • Reads the machine GUID from the registry

      • XWORM.exe (PID: 4984)
      • RuntimeBroker.exe (PID: 6380)
      • RuntimeBroker.exe (PID: 2996)
      • RuntimeBroker.exe (PID: 3936)
    • Reads Environment values

      • XWORM.exe (PID: 4984)
    • Disables trace logs

      • XWORM.exe (PID: 4984)
    • Checks proxy server information

      • XWORM.exe (PID: 4984)
      • slui.exe (PID: 6756)
    • Launching a file from a Registry key

      • XWORM.exe (PID: 4984)
    • Launching a file from the Startup directory

      • XWORM.exe (PID: 4984)
    • Creates files or folders in the user directory

      • XWORM.exe (PID: 4984)
    • Manual execution by a user

      • RuntimeBroker.exe (PID: 2996)
    • Reads the software policy settings

      • slui.exe (PID: 6756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

XWorm

(PID) Process(4984) XWORM.exe
C2dudn.xyz:1000
Keys
AESHORIZON
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWORM 5.6
Mutexpj9NHo2Srl3u3xXq
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:20 10:01:29+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 307200
InitializedDataSize: 252928
UninitializedDataSize: -
EntryPoint: 0x32690
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe #XWORM xworm.exe svchost.exe schtasks.exe no specs conhost.exe no specs runtimebroker.exe no specs slui.exe runtimebroker.exe no specs runtimebroker.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1216\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2044"C:\Users\admin\Desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe" C:\Users\admin\Desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2996C:\Users\admin\AppData\Roaming\RuntimeBroker.exeC:\Users\admin\AppData\Roaming\RuntimeBroker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3936"C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\admin\AppData\Roaming\RuntimeBroker.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4984"C:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\XWORM.exe
rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\xworm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
XWorm
(PID) Process(4984) XWORM.exe
C2dudn.xyz:1000
Keys
AESHORIZON
Options
Splitter<Xwormmm>
Sleep time3
USB drop nameXWORM 5.6
Mutexpj9NHo2Srl3u3xXq
6292"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Windows\System32\schtasks.exeXWORM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6380"C:\Users\admin\AppData\Roaming\RuntimeBroker.exe"C:\Users\admin\AppData\Roaming\RuntimeBroker.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6756C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
5 741
Read events
5 726
Write events
15
Delete events
0

Modification events

(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4984) XWORM.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XWORM_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
51
Suspicious files
5
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\XWorm.exe.configxml
MD5:DA07C2AF754C1B46C1F46BEB4A5CD5C9
SHA256:60FDA282BBC1AEB836B158DD6DDE523E5225B365CC6FC0338DAB9E82347B1E2D
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\SimpleObfuscator.dllexecutable
MD5:9043D712208178C33BA8E942834CE457
SHA256:B7A6EEA19188B987DAD97B32D774107E9A1BEB4F461A654A00197D73F7FAD54C
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (14).icoimage
MD5:0C24EDEC606ABDA7C6570B7DCF439298
SHA256:8FC693238AFC49A8098DAC1762BFAE891E818BB84749C6EEF5F1B0C6C8FFDDB2
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (1).icoimage
MD5:4F409511E9F93F175CD18187379E94CB
SHA256:115F0DB669B624D0A7782A7CFAF6E7C17282D88DE3A287855DBD6FE0F8551A8F
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (17).icoimage
MD5:167425A3FA7114B1800AA903ADC35B2A
SHA256:12F600B09C0DB00877684A950FC14936ECC28DF8F0DDC6821D68E4B82077AD92
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (12).icoimage
MD5:4EA9AB789F5AE96766E3F64C8A4E2480
SHA256:84B48CA52DFCD7C74171CF291D2EF1247C3C7591A56B538083834D82857FEE50
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (15).icoimage
MD5:E3143E8C70427A56DAC73A808CBA0C79
SHA256:B2F57A23ECC789C1BBF6037AC0825BF98BABC7BF0C5D438AF5E2767A27A79188
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (13).icoimage
MD5:E6FEC4185B607E01A938FA405E0A6C6C
SHA256:2E2F17B7DD15007192E7CBBD0019355F8BE58068DC5042323123724B99AE4B44
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (16).icoimage
MD5:14465D8D0F4688A4366C3BF163BA0A17
SHA256:3F3C5CE486E5B9FA88DC60B60916053E8808C69167DF1A11287FD3CD6DB1CA6E
2044rl_f08f77c93c18f55c22c54418b22c4e658d1272f838572a2063796545be6d2015.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Icons\icon (2).icoimage
MD5:F1463F4E1A6EF6CC6E290D46830D2DA1
SHA256:142B529799268A753F5214265C53A26A7A6F8833B31640C90A69A4FF94CEE5EC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
24
DNS requests
9
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6404
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4984
XWORM.exe
GET
200
208.95.112.1:80
http://ip-api.com/line/?fields=hosting
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6404
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6404
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.110
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
dudn.xyz
  • 45.201.0.222
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 20.189.173.17
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2200
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
4984
XWORM.exe
A Network Trojan was detected
ET MALWARE Common Stealer Behavior - Source IP Associated with Hosting Provider Check via ip.api .com
4984
XWORM.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
4984
XWORM.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External Hosting Lookup by ip-api
No debug info