URL:

https://ln.run/FVjnhtEqPi

Full analysis: https://app.any.run/tasks/4b190d09-e301-47c1-badd-6c21ea0448a9
Verdict: Malicious activity
Analysis date: July 05, 2025, 21:37:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
phishing
Indicators:
MD5:

2B7B701A049F9B7E884BFEAAEA0A6966

SHA1:

0C00F83F059DB9ACEFC1DF49BE1414A0C5285A66

SHA256:

5ADE0263BC99882374023AA0F3F1292BF3012865AA7C475AAD9FA2D91FEEB287

SSDEEP:

3:N8LjewYUGn:2fejt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 5012)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#PHISHING msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
5012"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --webtransport-developer-mode --string-annotations --always-read-main-dll --field-trial-handle=2180,i,6161488519127897921,10116046693238162506,262144 --variations-seed-version --mojo-platform-channel-handle=2512 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
19
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b5text
MD5:638A4990025383A0F83EBF29BDB84A68
SHA256:878E34B89800BB271D3588E526EB3598EB3822E263F3BDAF53645847D39D0AD6
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b8compressed
MD5:30C33D0342A968EF9DA1C53C8F73BDA9
SHA256:358FC12E3646363B230E58836DED9439764F274B473CDE87D420518624BAE753
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b9compressed
MD5:5856BAF64A567ECFDAE586266F3D61EB
SHA256:1E444AD555E3F20E67F505E40F30ED3E67D5906610EE677281B367801E51EF66
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000becompressed
MD5:14F91CAFBFD4E524F311A37973E6E481
SHA256:5A6DDE631FF5FC56D2EE4B0717C9770A07051DE1A1D17FCB5B7D772BE576E9B9
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bccompressed
MD5:F9E969A5FF052424471F3B3C656FD229
SHA256:0B6875FF3955B3F51370572FB12E0F30FB0581700D2897A107168069C36CD70F
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bbcompressed
MD5:5CE1221D0C808E793257C2A22C27785A
SHA256:747DF228294DC3A10F67F0EE84311E52782DE4C633014F35A9ED8A7758AC9570
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State~RFc712e.TMPbinary
MD5:8CA6AC4CD0D4F8B2EA5A9FC6FD4311D7
SHA256:EE810A451AEA499C3D6F89EDB840ED025DF0937874485A211A3BB39F915F4EA0
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bfcompressed
MD5:4A351996473A7B588A3EA45E829E362C
SHA256:DE39358EA92E4B45DF8F25FD53C29E599FBC7768108E221D3971F37ADA8A2B3A
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\c3293192-3d20-473c-aaa6-b7a9c3f3111a.tmpbinary
MD5:F054A7D6E382DF24018FE84986B710A2
SHA256:4E5235C6B40BCE6C5FD0554D554FCDB38E8016DCDDFA9CAB63103407CAF8DAEB
5012msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent Statebinary
MD5:F054A7D6E382DF24018FE84986B710A2
SHA256:4E5235C6B40BCE6C5FD0554D554FCDB38E8016DCDDFA9CAB63103407CAF8DAEB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
69
TCP/UDP connections
104
DNS requests
63
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4900
svchost.exe
HEAD
403
208.89.74.29:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/4c4fdee0-d69c-42b7-bf5c-3ec046e9dfc9?P1=1751247403&P2=404&P3=2&P4=KIOuyaltQzGUv9%2fRXevwe%2b%2fSXHyfYvf%2f5L%2fb6O%2fEjuA9bg7JGUT71DQcxatSu%2by%2f0Fb5ScE2gwu8%2bMYnHtBQiQ%3d%3d
unknown
whitelisted
HEAD
200
23.212.222.21:443
https://fs.microsoft.com/fs/windows/config.json
unknown
GET
301
104.21.16.1:443
https://ln.run/FVjnhtEqPi
unknown
GET
200
23.212.222.21:443
https://fs.microsoft.com/fs/windows/config.json
unknown
binary
55 b
whitelisted
GET
200
62.60.226.160:443
https://steamcormmunilty.com/activation=FVjnhtEqPi
unknown
html
1023 b
6464
RUXIMICS.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5012
msedge.exe
GET
403
208.89.74.29:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/4c4fdee0-d69c-42b7-bf5c-3ec046e9dfc9?P1=1751247403&P2=404&P3=2&P4=KIOuyaltQzGUv9%2fRXevwe%2b%2fSXHyfYvf%2f5L%2fb6O%2fEjuA9bg7JGUT71DQcxatSu%2by%2f0Fb5ScE2gwu8%2bMYnHtBQiQ%3d%3d
unknown
whitelisted
5336
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4140
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6464
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6464
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5336
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4140
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1536
msedge.exe
224.0.0.251:5353
unknown
4900
svchost.exe
208.89.74.29:80
msedge.b.tlu.dl.delivery.mp.microsoft.com
US
whitelisted
4900
svchost.exe
23.212.222.21:443
fs.microsoft.com
AKAMAI-AS
AU
whitelisted
5012
msedge.exe
104.21.80.1:443
ln.run
CLOUDFLARENET
unknown
6464
RUXIMICS.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4140
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5012
msedge.exe
208.89.74.29:80
msedge.b.tlu.dl.delivery.mp.microsoft.com
US
whitelisted

DNS requests

Domain
IP
Reputation
msedge.b.tlu.dl.delivery.mp.microsoft.com
  • 208.89.74.29
  • 208.89.74.23
  • 208.89.74.31
  • 208.89.74.19
  • 208.89.74.17
  • 208.89.74.21
  • 208.89.74.27
whitelisted
google.com
  • 142.250.185.78
whitelisted
fs.microsoft.com
  • 23.212.222.21
whitelisted
ln.run
  • 104.21.80.1
  • 104.21.32.1
  • 104.21.96.1
  • 104.21.16.1
  • 104.21.64.1
  • 104.21.112.1
  • 104.21.48.1
unknown
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
steamcormmunilty.com
  • 62.60.226.160
unknown
www.microsoft.com
  • 184.30.21.171
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.16.241.218
  • 2.16.241.201
  • 104.126.37.176
  • 104.126.37.139
  • 104.126.37.171
  • 104.126.37.155
  • 104.126.37.185
  • 104.126.37.162
  • 104.126.37.163
  • 104.126.37.123
  • 104.126.37.154
whitelisted

Threats

PID
Process
Class
Message
Misc activity
INFO [ANY.RUN] Possible short link service (ln .run)
Misc activity
INFO [ANY.RUN] Possible short link service (ln .run)
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 7
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Fake Steam Domain 2
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Fake Steam Domain 2
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] Image Sharing Service (imgur.com)
No debug info