Hi Shabana Thasneem,
Microsoft DNS does not have a "secret telemetry feature" connecting to Metasploit port 4444 or Tor port 9001. Your dns.exe and the server are completely clean. What you are seeing is a classic Sysmon logging illusion. You are looking a DNS responses, not outbound attacks.
Here is the technical reality of your log (SourcePort: 53 DestinationPort: 4444): Because UDP is a stateless protocol, when a client machine sends a DNS query to your server's Port 53, it originates from an ephemeral (dynamic) source port on the client side. If a client purposefully (or accidentally) sends a query from its own port 4444, your DNS server is obligated to send the answer back to port 4444. Sysmon simply logs dns.exe generating this reply packet, and analysts often misinterpret it as a malicious outbound connection.
The "Destination IPs" in your logs are the actual culprits. They are likely:
Internal vulnerability scanners (Nessus, Qualys, Nmap, etc.) intentionally crafting packets with weird source ports to map your network.
Infected internal machines running port scans or malware that happen to query your DNS server using those specific ports.
Stop investigating the DNS server. Look at the DestinationIp in those logs. Go to that specific client machine and use Sysmon/Netstat to find out what process is generating those weird outbound DNS requests.
If this helps clarify the behavior, please click "Accept Answer".
Tracy Le.