URL:

https://urldefense.com/v3/__https:/login.business-services.org/da5fd4424e?l=3__%3B%21%21EBLb5UxCw7cfUSo%21SvowabxgNPwZBEIbOJOK2ejXA0xNoWKCcEfC4SSU6bn3C-hf3hRS7kwvTlpzdSRzp41wgEX2z6bcNcbpSMPCNbBFtgM3gLQ%24

Full analysis: https://app.any.run/tasks/23ae2e8b-2d33-47eb-b787-6f0cea86bcda
Verdict: Malicious activity
Analysis date: March 25, 2026, 16:36:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
phishing
sec-awareness
Indicators:
MD5:

F0101DD571265C3904980BFFD6A55B18

SHA1:

D4BA775667F03B24CD62CC89A4338F6380A62FF7

SHA256:

93F078B6AA9027BAF0184F37EB992594F5213CBC15EDC6AB690DB449691AF815

SSDEEP:

6:2UJtIrhVplrp/mpJ51+7gsyw0nitErGKR:2U0tlrdRITnYCGKR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 7028)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
#PHISHING msedge.exe

Process information

PID
CMD
Path
Indicators
Parent process
7028"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --webtransport-developer-mode --string-annotations --always-read-main-dll --field-trial-handle=2256,i,13378875761215938322,9620771509043916482,262144 --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
19
Text files
14
Unknown types
0

Dropped files

PID
Process
Filename
Type
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b5compressed
MD5:1DCA01C6231917AABE380A98F67DAE36
SHA256:47126BAB74AC1FD0C429292DFDE3FACE2F931752C30E527888763166088B451C
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b8text
MD5:00A513F07603DF01E3B99BE00F370754
SHA256:4BAB432979D731F8264BCD9D40422CA7DFCFCB0E0E703288DB78BBFA555F853A
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bccompressed
MD5:83B3B5729CDFF3976DB52C51831E96B8
SHA256:675FA88B39008A09994460A93B310A7D4593735009A9B24B6F176C347AD12421
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c0compressed
MD5:47FEF3745452B8AF6196ADC0E73084F0
SHA256:416A096F0DCE236C69C9376CB7571BE669D610767262A9B940D3D34A34EE1058
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000b7text
MD5:0D5882D41C8B6E40059C8D9ACBCF1518
SHA256:D9B7C6163477008469AF64B211E2DBD4F4171B85B51E3714F11C99F9BA2C32F9
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bftext
MD5:0D5882D41C8B6E40059C8D9ACBCF1518
SHA256:D9B7C6163477008469AF64B211E2DBD4F4171B85B51E3714F11C99F9BA2C32F9
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c4text
MD5:E058DA6EEE103F247ABB567063E4DC31
SHA256:B7A27AA92648EDD6FD850410DECE4DB791B3973CA6E87DA3AE07887B692A5F22
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c1compressed
MD5:47FEF3745452B8AF6196ADC0E73084F0
SHA256:416A096F0DCE236C69C9376CB7571BE669D610767262A9B940D3D34A34EE1058
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c2text
MD5:E9777CCE61BC47FC36DB6BFAD8BC8414
SHA256:3C18DD39FE8A5DDC36174524CF9A645B9D0EC98D2BE49BE035CF7EA6B85031C1
7028msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c3binary
MD5:3100B567D32D250E608954C5CD1F8BA8
SHA256:B0D93156F5D5B10A6F2A106EE43EF38F990600E2CCD6DD9EDAB371EA7109F823
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
211
TCP/UDP connections
96
DNS requests
71
Threats
102

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5336
MoUsoCoreWorker.exe
GET
304
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/wsd/muse?ProcessorClockSpeed=3593&FlightIds=&UpdateOfferedDays=344&BranchReadinessLevel=CB&OEMManufacturerName=DELL&IsCloudDomainJoined=0&ProcessorIdentifier=AMD64%20Family%206%20Model%2014%20Stepping%203&sku=48&ActivationChannel=Retail&AttrDataVer=188&IsMDMEnrolled=0&ProcessorCores=4&ProcessorModel=Intel%28R%29%20Core%28TM%29%20i5-6400%20CPU%20%40%202.70GHz&TotalPhysicalRAM=4096&PrimaryDiskType=4294967295&FlightingBranchName=&ChassisTypeId=1&OEMModelNumber=DELL&SystemVolumeTotalCapacity=260246&sampleId=95271487&deviceClass=Windows.Desktop&App=muse&DisableDualScan=0&AppVer=10.0&OEMSubModel=J5CR&locale=en-US&IsAlwaysOnAlwaysConnectedCapable=0&ms=0&DefaultUserRegion=244&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&os=windows&deviceId=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&DeferQualityUpdatePeriodInDays=0&ring=Retail&DeferFeatureUpdatePeriodInDays=30
unknown
whitelisted
4868
RUXIMICS.exe
GET
304
51.104.136.2:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/RUXIM?os=Windows&osVer=10.0.19045.4046.amd64fre.vb_release.191206-1406&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3623&OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&FlightRing=Retail&AttrDataVer=188&App=RUXIM&AppVer=&DeviceFamily=Windows.Desktop
unknown
whitelisted
GET
302
51.102.198.211:443
https://urldefense.com/v3/__https:/login.business-services.org/da5fd4424e?l=3__%3B%21%21EBLb5UxCw7cfUSo%21SvowabxgNPwZBEIbOJOK2ejXA0xNoWKCcEfC4SSU6bn3C-hf3hRS7kwvTlpzdSRzp41wgEX2z6bcNcbpSMPCNbBFtgM3gLQ%24
unknown
7028
msedge.exe
GET
200
18.208.35.229:443
https://login.business-services.org/da5fd4424e?l=3
unknown
text
3.94 Kb
unknown
5336
MoUsoCoreWorker.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7760
svchost.exe
HEAD
200
104.102.63.189:443
https://fs.microsoft.com/fs/windows/config.json
unknown
whitelisted
4868
RUXIMICS.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7700
svchost.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5336
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7700
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4868
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5336
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7700
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
224.0.0.251:5353
whitelisted
7028
msedge.exe
52.71.28.102:443
urldefense.com
AMAZON-AES
US
whitelisted
4868
RUXIMICS.exe
23.216.77.29:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
5336
MoUsoCoreWorker.exe
23.216.77.29:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
7700
svchost.exe
23.216.77.29:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
7028
msedge.exe
34.206.150.70:443
login.business-services.org
AMAZON-AES
US
whitelisted
7700
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 216.58.206.78
whitelisted
urldefense.com
  • 52.71.28.102
  • 52.6.56.188
  • 52.204.90.22
whitelisted
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.30
  • 23.216.77.26
  • 23.216.77.31
  • 23.216.77.32
  • 23.216.77.22
  • 23.216.77.28
  • 23.216.77.35
  • 23.216.77.25
  • 23.216.77.8
  • 23.216.77.41
  • 23.216.77.20
  • 23.216.77.6
  • 23.216.77.36
  • 23.216.77.18
whitelisted
login.business-services.org
  • 34.206.150.70
  • 18.208.35.229
unknown
www.microsoft.com
  • 88.221.169.152
  • 23.59.18.102
whitelisted
tslp.s3.amazonaws.com
  • 52.217.235.49
  • 52.217.226.49
  • 52.216.40.201
  • 16.15.207.38
  • 3.5.10.16
  • 3.5.6.143
  • 3.5.21.13
  • 54.231.169.121
whitelisted
www.bing.com
  • 184.86.251.11
  • 184.86.251.5
  • 184.86.251.8
  • 184.86.251.15
  • 184.86.251.9
  • 184.86.251.12
  • 184.86.251.13
  • 184.86.251.7
  • 184.86.251.4
  • 2.16.204.141
  • 2.16.204.161
  • 2.16.204.137
  • 2.16.204.136
  • 2.16.204.160
  • 2.16.204.158
  • 2.16.204.157
  • 2.16.204.135
  • 2.16.204.139
whitelisted
java.com
  • 138.1.33.162
whitelisted
fs.microsoft.com
  • 104.102.63.189
whitelisted

Threats

PID
Process
Class
Message
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Proofpoint Security Awareness Training
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Proofpoint Security Awareness Training
4868
RUXIMICS.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Proofpoint Security Awareness Training
7028
msedge.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain by CrossDomain (tslp .s3 .amazonaws .com)
7028
msedge.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain by CrossDomain (tslp .s3 .amazonaws .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Proofpoint Security Awareness Training
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Proofpoint Security Awareness Training
Misc activity
ET INFO JAVA - ClassID
7028
msedge.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain by CrossDomain (tslp .s3 .amazonaws .com)
No debug info