URL:

https://trackingservice.monday.com/tracker/link?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJvcmlnaW5hbFVybCI6Imh0dHBzOi8vY2xpZW50ZS5ndWFyZGlhbnRyYWMuY29tLmJyL3Nzby9iaWRzL2RvY3VzaWduL3Byb3Bvc2Fscy9kb2N1c2lnbi9zZWN1cmUtZW52ZWxvcGUvcmV2aWV3LWNvbXBsZXRlL2RvY3VtZW50LWFjY2Vzcy9zZXNzaW9uLXZhbGlkYXRpb24iLCJlbWFpbElkIjoiZDQ3ODlhMDQtZDZmMS00ZTIwLWI3OWYtYjIxMWY3YmYwYWMxIiwiaWF0IjoxNzc2MTY3MTAzfQ.wQiSJcNfhO4ToVE4ItzABemhVNZQhn1IqN3Uu_7LV5o&r=use1

Full analysis: https://app.any.run/tasks/b96807f8-ba37-48ea-8e44-814cff937497
Verdict: Malicious activity
Analysis date: April 14, 2026, 19:17:33
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
phishing
MD5:

35461821C67A6772167107EAB0F28240

SHA1:

67FFDD58EBE54D66C746E9ADD85F8ADB1D411D15

SHA256:

5A76FDA8B395B2C36F2BBF45A8CC2266EEB682CEBAB338CD0A160E5ADD26FB3A

SSDEEP:

6:2nCrFGrbVh7r4g70x1TFCBIg3vPStKG0Tnd/ZHd8kQtp45QGb9laIkOAsPXd/XkG:2nr3V5/0FCBN303+dBWkQGZ/dAsZUsdx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
7028"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --webtransport-developer-mode --string-annotations --always-read-main-dll --field-trial-handle=2256,i,13378875761215938322,9620771509043916482,262144 --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b5
MD5:F63D8A43AA8DD92395C754C06976C222
SHA256:171072793E233BA728FFB6875FD3465C82A01B7B4DFC80C683D73531AD1BB1A9
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\906a923f-ee29-4a47-8055-9e9a8ae14d93.tmptext
MD5:F054A7D6E382DF24018FE84986B710A2
SHA256:4E5235C6B40BCE6C5FD0554D554FCDB38E8016DCDDFA9CAB63103407CAF8DAEB
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RFf03df.TMPtext
MD5:8CA6AC4CD0D4F8B2EA5A9FC6FD4311D7
SHA256:EE810A451AEA499C3D6F89EDB840ED025DF0937874485A211A3BB39F915F4EA0
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b6compressed
MD5:F3AD19FDBD15A27B32A4D25E49CC266E
SHA256:3A657EDDEC2905CE29950E37A3CC78C6839AFC858FE26A89490A1502BE032D13
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent Statetext
MD5:F054A7D6E382DF24018FE84986B710A2
SHA256:4E5235C6B40BCE6C5FD0554D554FCDB38E8016DCDDFA9CAB63103407CAF8DAEB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
96
TCP/UDP connections
81
DNS requests
56
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
MoUsoCoreWorker.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3593&FlightIds=&UpdateOfferedDays=344&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%206%20Model%2014%20Stepping%203&sku=48&ActivationChannel=Retail&AttrDataVer=188&IsMDMEnrolled=0&ProcessorCores=4&ProcessorModel=Intel%28R%29%20Core%28TM%29%20i5-6400%20CPU%20%40%202.70GHz&TotalPhysicalRAM=4096&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260246&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
US
whitelisted
7760
svchost.exe
HEAD
200
104.102.63.189:443
https://fs.microsoft.com/fs/windows/config.json
US
whitelisted
4196
svchost.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
6888
RUXIMICS.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
7028
msedge.exe
GET
302
104.16.50.19:443
https://trackingservice.monday.com/tracker/link?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJvcmlnaW5hbFVybCI6Imh0dHBzOi8vY2xpZW50ZS5ndWFyZGlhbnRyYWMuY29tLmJyL3Nzby9iaWRzL2RvY3VzaWduL3Byb3Bvc2Fscy9kb2N1c2lnbi9zZWN1cmUtZW52ZWxvcGUvcmV2aWV3LWNvbXBsZXRlL2RvY3VtZW50LWFjY2Vzcy9zZXNzaW9uLXZhbGlkYXRpb24iLCJlbWFpbElkIjoiZDQ3ODlhMDQtZDZmMS00ZTIwLWI3OWYtYjIxMWY3YmYwYWMxIiwiaWF0IjoxNzc2MTY3MTAzfQ.wQiSJcNfhO4ToVE4ItzABemhVNZQhn1IqN3Uu_7LV5o&r=use1
US
binary
322 b
unknown
5336
MoUsoCoreWorker.exe
GET
200
23.55.110.211:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
4196
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
6888
RUXIMICS.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
5336
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
5152
svchost.exe
POST
200
40.126.31.69:443
https://login.live.com/RST2.srf
US
binary
1.24 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4196
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6888
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5336
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
224.0.0.251:5353
whitelisted
4196
svchost.exe
23.55.110.211:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6888
RUXIMICS.exe
23.55.110.211:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
7028
msedge.exe
104.16.50.19:443
trackingservice.monday.com
CLOUDFLARENET
US
whitelisted
5336
MoUsoCoreWorker.exe
23.55.110.211:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
4196
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
6888
RUXIMICS.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 192.178.183.100
  • 192.178.183.101
  • 192.178.183.139
  • 192.178.183.102
  • 192.178.183.113
  • 192.178.183.138
whitelisted
crl.microsoft.com
  • 23.55.110.211
  • 23.55.110.193
  • 2.16.241.12
  • 2.16.241.19
whitelisted
trackingservice.monday.com
  • 104.16.50.19
  • 104.16.51.19
unknown
www.microsoft.com
  • 88.221.169.152
  • 72.246.29.11
whitelisted
login.live.com
  • 40.126.31.73
  • 40.126.31.3
  • 40.126.31.1
  • 20.190.159.131
  • 20.190.159.68
  • 20.190.159.23
  • 40.126.31.131
  • 20.190.159.129
whitelisted
cliente.guardiantrac.com.br
  • 172.67.178.222
  • 104.21.17.240
unknown
fs.microsoft.com
  • 104.102.63.189
whitelisted
static.cloudflareinsights.com
  • 104.16.80.73
  • 104.16.79.73
whitelisted
www.bing.com
  • 184.86.251.13
  • 184.86.251.9
  • 184.86.251.19
  • 184.86.251.22
  • 184.86.251.27
  • 184.86.251.7
  • 184.86.251.24
  • 184.86.251.14
  • 184.86.251.12
  • 184.86.251.8
  • 184.86.251.15
  • 184.86.251.25
  • 184.86.251.4
  • 184.86.251.5
  • 184.86.251.23
  • 104.126.37.178
  • 104.126.37.136
  • 104.126.37.171
  • 104.126.37.128
  • 104.126.37.123
  • 104.126.37.163
  • 104.126.37.186
  • 104.126.37.131
  • 104.126.37.130
  • 92.123.104.59
  • 92.123.104.50
  • 92.123.104.65
  • 92.123.104.39
  • 92.123.104.58
  • 92.123.104.47
  • 92.123.104.45
  • 92.123.104.52
  • 92.123.104.62
whitelisted

Threats

PID
Process
Class
Message
5336
MoUsoCoreWorker.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspicious sending of an email address as an unencrypted POST request
7028
msedge.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .icu Domain
7028
msedge.exe
Potentially Bad Traffic
ET INFO Suspicious Domain (*.icu) in TLS SNI
No debug info