URL:

https://one.one.one.one/

Full analysis: https://app.any.run/tasks/7c83cf7b-9377-4b9a-8159-7c8cf0e31076
Verdict: Malicious activity
Analysis date: May 02, 2025, 19:14:27
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MD5:

7EB8C3836CAE930C02577B46EF6D96A4

SHA1:

365D2A74A48FD0F6D6CAEAB9AF92D88DD86E99C5

SHA256:

4598422E7B567765993E45F855DD58FDAABCF3B050F066799413863B40D2F84D

SSDEEP:

3:N8CuQH:2CuQH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates file in the systems drive root

      • explorer.exe (PID: 5492)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7956)
      • warp-svc.exe (PID: 1812)
    • Uses RUNDLL32.EXE to load library

      • msiexec.exe (PID: 8272)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 8572)
      • rundll32.exe (PID: 776)
      • warp-svc.exe (PID: 1812)
      • Cloudflare WARP.exe (PID: 6256)
      • drvinst.exe (PID: 8288)
    • Application launched itself

      • msiexec.exe (PID: 672)
    • Starts SC.EXE for service management

      • rundll32.exe (PID: 776)
    • Creates a new Windows service

      • sc.exe (PID: 5132)
    • Windows service management via SC.EXE

      • sc.exe (PID: 1852)
      • sc.exe (PID: 8652)
    • Process drops legitimate windows executable

      • Cloudflare WARP.exe (PID: 6256)
    • The process drops C-runtime libraries

      • Cloudflare WARP.exe (PID: 6256)
    • Drops a system driver (possible attempt to evade defenses)

      • drvinst.exe (PID: 8288)
      • warp-svc.exe (PID: 1812)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 5492)
    • Restarts service on failure

      • sc.exe (PID: 8292)
    • Sets the service to start on system boot

      • sc.exe (PID: 4756)
    • Uses SYSTEMINFO.EXE to read the environment

      • cmd.exe (PID: 5528)
    • Process uses IPCONFIG to get network configuration information

      • cmd.exe (PID: 5528)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 8708)
      • msiexec.exe (PID: 672)
    • Reads Environment values

      • identity_helper.exe (PID: 8708)
    • Reads the computer name

      • identity_helper.exe (PID: 8708)
      • msiexec.exe (PID: 672)
    • Reads the software policy settings

      • slui.exe (PID: 8120)
      • explorer.exe (PID: 5492)
      • msiexec.exe (PID: 2908)
    • Application launched itself

      • msedge.exe (PID: 5048)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 5492)
      • msiexec.exe (PID: 2908)
    • Reads Microsoft Office registry keys

      • explorer.exe (PID: 5492)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 5492)
    • Checks proxy server information

      • explorer.exe (PID: 5492)
    • Create files in a temporary directory

      • msiexec.exe (PID: 2908)
    • The sample compiled with english language support

      • msedge.exe (PID: 6828)
      • msiexec.exe (PID: 672)
      • warp-svc.exe (PID: 1812)
      • Cloudflare WARP.exe (PID: 6256)
      • drvinst.exe (PID: 8288)
    • Manages system restore points

      • SrTasks.exe (PID: 1568)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6828)
      • msiexec.exe (PID: 672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
252
Monitored processes
98
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs rundll32.exe no specs explorer.exe msiexec.exe no specs msedge.exe no specs msiexec.exe vssvc.exe no specs msedge.exe msedge.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe no specs rundll32.exe msedge.exe no specs msedge.exe no specs rundll32.exe sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs warp-svc.exe msiexec.exe no specs cloudflare warp.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs drvinst.exe drvinst.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs slui.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs systeminfo.exe no specs tiworker.exe no specs msedge.exe no specs ipconfig.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
736"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7240 --field-trial-handle=2344,i,11147434635236036199,1044239521987401336,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
776rundll32.exe "C:\WINDOWS\Installer\MSIF48E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1242578 36 Warp.Installer.Actions!Warp.Installer.Actions.CustomActions.InstallServiceC:\Windows\System32\rundll32.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
920"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=5208 --field-trial-handle=2344,i,11147434635236036199,1044239521987401336,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=8172 --field-trial-handle=2344,i,11147434635236036199,1044239521987401336,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1004\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1132"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6476 --field-trial-handle=2344,i,11147434635236036199,1044239521987401336,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1568C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1812"C:\Program Files\Cloudflare\Cloudflare WARP\warp-svc.exe"C:\Program Files\Cloudflare\Cloudflare WARP\warp-svc.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Description:
warp-svc
Version:
2025.2.0
Modules
Images
c:\program files\cloudflare\cloudflare warp\warp-svc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
1852"sc.exe" config CloudflareWARP depend= "wlansvc"C:\Windows\System32\sc.exerundll32.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
56 967
Read events
56 463
Write events
475
Delete events
29

Modification events

(PID) Process:(5048) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5048) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5048) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5048) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5048) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
7DA38D3EC2922F00
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:00000000000802C6
Operation:writeName:VirtualDesktop
Value:
1000000030304456BFA0DB55E4278845B426357D5B5F97B3
(PID) Process:(5048) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
766A993EC2922F00
(PID) Process:(5048) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\524998
Operation:writeName:WindowTabManagerFileMappingId
Value:
{D8D57849-DE5C-4CF0-BF1A-D9903B24829E}
(PID) Process:(5048) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\524998
Operation:writeName:WindowTabManagerFileMappingId
Value:
{C1990471-9CF0-44E3-A911-8FDC8B14E87F}
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000040306
Operation:writeName:VirtualDesktop
Value:
1000000030304456BFA0DB55E4278845B426357D5B5F97B3
Executable files
44
Suspicious files
443
Text files
87
Unknown types
2

Dropped files

PID
Process
Filename
Type
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10d004.TMP
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10d004.TMP
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10cff4.TMP
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10d004.TMP
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10d042.TMP
MD5:
SHA256:
5048msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
52
TCP/UDP connections
125
DNS requests
114
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
GET
206
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/241074c3-f448-482a-8c90-855c388ea76a?P1=1746418006&P2=404&P3=2&P4=Rwxj1ANj2Ca7SXgeJzpcyQsHx1Wozq7nRlY1I3wPPgzr6PF4b0MnTpvcEhqOP%2f7deIsIxk3MaijZ2ttKSeAoLQ%3d%3d
unknown
whitelisted
8340
svchost.exe
HEAD
200
2.19.11.113:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/cf34b06a-2f53-4bd0-9d11-b58cf2e820a4?P1=1746418006&P2=404&P3=2&P4=Bba%2f1RXjqGvnDolM32stFTXuqrV9pkFA9L1lrPcIMLIdOY3seD1FV6y%2fp1xf0hsPgJYKm%2fHVHi%2fJAPrSCKUnrA%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5048
msedge.exe
239.255.255.250:1900
whitelisted
7316
msedge.exe
1.1.1.1:443
one.one.one.one
whitelisted
7316
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
one.one.one.one
  • 1.1.1.1
  • 1.0.0.1
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
www.bing.com
  • 92.123.104.32
  • 92.123.104.54
  • 92.123.104.47
  • 92.123.104.62
  • 92.123.104.50
  • 92.123.104.33
  • 92.123.104.61
  • 92.123.104.53
  • 92.123.104.52
  • 2.23.227.215
  • 2.23.227.208
  • 92.123.104.34
  • 92.123.104.63
  • 92.123.104.59
  • 92.123.104.19
  • 92.123.104.17
  • 92.123.104.31
whitelisted

Threats

PID
Process
Class
Message
1812
warp-svc.exe
Misc activity
ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Misc activity
ET INFO Microsoft Connection Test
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
1812
warp-svc.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info