URL:

https://www3.gobiernodecanarias.org/tributos/atc/jsf/publico/asistenciaContribuyente/modelos/listado.jsp?tributo=IGIC

Full analysis: https://app.any.run/tasks/08fb2d20-ae04-45e7-bb2a-73329690e384
Verdict: Malicious activity
Analysis date: April 10, 2025, 14:14:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
arch-scr
java
Indicators:
MD5:

C8940DFFEF365A9B754A9A4CE5FCE65E

SHA1:

EE6E0283208E2F51F8E0A472111CB695F8128FD0

SHA256:

B48AD2F91626C7FEA15B25F8C9F7309EF0E6B9DB93F659C576CC515DEB26AC6B

SSDEEP:

3:N8DSWLJhLabFMOIPD/idK/cKLKHw2XILRHwiH:2OMKq/PjidKTL52m9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • javaw.exe (PID: 5228)
      • win64_32_x64.exe (PID: 7928)
      • win64_32_x64.exe (PID: 7844)
      • win64_32_x64.exe (PID: 4572)
      • win64_32_x64.exe (PID: 6572)
      • win64_32_x64.exe (PID: 5936)
      • remove.exe (PID: 1616)
      • IconChng.exe (PID: 6228)
    • Changes the autorun value in the registry

      • ie4uinit.exe (PID: 4376)
      • ie4uinit.exe (PID: 5972)
      • ie4uinit.exe (PID: 7928)
      • ie4uinit.exe (PID: 8164)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • M420V920E25.exe (PID: 1812)
      • javaw.exe (PID: 5228)
      • IconChng.exe (PID: 6228)
    • Process drops legitimate windows executable

      • M420V920E25.exe (PID: 1812)
      • javaw.exe (PID: 5228)
    • The process drops C-runtime libraries

      • M420V920E25.exe (PID: 1812)
      • javaw.exe (PID: 5228)
    • Uses ICACLS.EXE to modify access control lists

      • javaw.exe (PID: 5228)
    • Uses WMIC.EXE to obtain operating system information

      • javaw.exe (PID: 5228)
    • Accesses operating system name via WMI (SCRIPT)

      • WMIC.exe (PID: 6044)
      • WMIC.exe (PID: 1676)
    • Checks for Java to be installed

      • java.exe (PID: 7744)
    • Uses ATTRIB.EXE to modify file attributes

      • javaw.exe (PID: 5228)
    • Creates a software uninstall entry

      • javaw.exe (PID: 5228)
    • There is functionality for taking screenshot (YARA)

      • javaw.exe (PID: 5228)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 8048)
      • M420V920E25.exe (PID: 1812)
      • M420V920E25.exe (PID: 208)
      • javaw.exe (PID: 5228)
      • win64_32_x64.exe (PID: 7928)
      • win64_32_x64.exe (PID: 7844)
      • java.exe (PID: 7744)
      • win64_32_x64.exe (PID: 6572)
      • win64_32_x64.exe (PID: 4572)
      • win64_32_x64.exe (PID: 5936)
      • IconChng.exe (PID: 6228)
      • javaw.exe (PID: 4976)
      • remove.exe (PID: 1616)
    • Application launched itself

      • msedge.exe (PID: 1512)
    • Reads Environment values

      • identity_helper.exe (PID: 8048)
    • Reads the computer name

      • identity_helper.exe (PID: 8048)
      • M420V920E25.exe (PID: 1812)
      • javaw.exe (PID: 5228)
      • javaw.exe (PID: 4976)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 1512)
      • msedge.exe (PID: 5548)
    • Autorun file from Downloads

      • msedge.exe (PID: 7872)
    • The sample compiled with english language support

      • M420V920E25.exe (PID: 1812)
      • javaw.exe (PID: 5228)
      • IconChng.exe (PID: 6228)
      • msedge.exe (PID: 5548)
    • Create files in a temporary directory

      • M420V920E25.exe (PID: 1812)
      • javaw.exe (PID: 5228)
      • java.exe (PID: 7744)
      • javaw.exe (PID: 4976)
    • Creates files in the program directory

      • javaw.exe (PID: 5228)
      • java.exe (PID: 7744)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 1676)
      • WMIC.exe (PID: 8020)
      • WMIC.exe (PID: 6044)
      • ie4uinit.exe (PID: 8164)
      • ie4uinit.exe (PID: 4376)
      • ie4uinit.exe (PID: 5972)
      • ie4uinit.exe (PID: 7928)
      • OpenWith.exe (PID: 2616)
    • Reads the software policy settings

      • slui.exe (PID: 516)
      • slui.exe (PID: 6208)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 5228)
      • ie4uinit.exe (PID: 8164)
      • javaw.exe (PID: 4976)
    • Checks proxy server information

      • slui.exe (PID: 6208)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 4976)
    • Application based on Java

      • javaw.exe (PID: 4976)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 2616)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
220
Monitored processes
85
Malicious processes
10
Suspicious processes
7

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs m420v920e25.exe no specs m420v920e25.exe msedge.exe no specs msedge.exe no specs m420v920e25.exe no specs javaw.exe icacls.exe no specs icacls.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs slui.exe win64_32_x64.exe no specs conhost.exe no specs win64_32_x64.exe no specs conhost.exe no specs java.exe no specs conhost.exe no specs win64_32_x64.exe no specs conhost.exe no specs win64_32_x64.exe no specs conhost.exe no specs win64_32_x64.exe no specs conhost.exe no specs attrib.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs iconchng.exe conhost.exe no specs ie4uinit.exe ie4uinit.exe msedge.exe ie4uinit.exe ie4uinit.exe remove.exe no specs msedge.exe no specs msedge.exe no specs openwith.exe no specs javaw.exe msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208C:\Users\admin\AppData\Local\Temp\I1744294535\Windows\M420V920E25.exe C:\Users\admin\AppData\Local\Temp\I1744294535\Windows\M420V920E25.exeM420V920E25.exe
User:
admin
Company:
Flexera Software
Integrity Level:
HIGH
Description:
LaunchAnywhere
Exit code:
0
Version:
18, 0, 0, 0
Modules
Images
c:\users\admin\appdata\local\temp\i1744294535\windows\m420v920e25.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
516"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
732"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6284 --field-trial-handle=2288,i,8602374458845280950,5596216364666438372,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
896\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeattrib.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1272"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5308 --field-trial-handle=2288,i,8602374458845280950,5596216364666438372,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1272"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=3924 --field-trial-handle=2288,i,8602374458845280950,5596216364666438372,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1512"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www3.gobiernodecanarias.org/tributos/atc/jsf/publico/asistenciaContribuyente/modelos/listado.jsp?tributo=IGIC"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1568"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6608 --field-trial-handle=2288,i,8602374458845280950,5596216364666438372,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1616"C:\Users\admin\AppData\Local\Temp\remove.exe"C:\Users\admin\AppData\Local\Temp\remove.exejavaw.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\remove.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1676wmic os get nameC:\Windows\SysWOW64\wbem\WMIC.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
10 783
Read events
10 561
Write events
150
Delete events
72

Modification events

(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1512) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
F9454E7E03912F00
(PID) Process:(1512) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
D9E8557E03912F00
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197458
Operation:writeName:WindowTabManagerFileMappingId
Value:
{C87C0F9A-E64A-47D4-9E57-39462BE823C4}
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197458
Operation:writeName:WindowTabManagerFileMappingId
Value:
{C62FEF10-F45D-4037-A5A1-FAC9D9463C53}
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197458
Operation:writeName:WindowTabManagerFileMappingId
Value:
{46E1DB4B-44EE-4E96-BBC7-112FF725D6CF}
(PID) Process:(1512) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\197458
Operation:writeName:WindowTabManagerFileMappingId
Value:
{368466F3-5427-4596-BF20-2701A061E200}
Executable files
268
Suspicious files
382
Text files
211
Unknown types
5

Dropped files

PID
Process
Filename
Type
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10b661.TMP
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10b671.TMP
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10b661.TMP
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10b671.TMP
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10b671.TMP
MD5:
SHA256:
1512msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
27
TCP/UDP connections
157
DNS requests
87
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1744637464&P2=404&P3=2&P4=AVIu6mvpKj3njWo5xi7YA1Qff%2fG%2bbfbQs8OMm6xmzCsDQ2hLiRqmlHtKfFL0gFFfAgGrS%2fNme6%2bwdS9Wd9wGgw%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1744637464&P2=404&P3=2&P4=AVIu6mvpKj3njWo5xi7YA1Qff%2fG%2bbfbQs8OMm6xmzCsDQ2hLiRqmlHtKfFL0gFFfAgGrS%2fNme6%2bwdS9Wd9wGgw%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1744637464&P2=404&P3=2&P4=AVIu6mvpKj3njWo5xi7YA1Qff%2fG%2bbfbQs8OMm6xmzCsDQ2hLiRqmlHtKfFL0gFFfAgGrS%2fNme6%2bwdS9Wd9wGgw%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/68591036-2289-4858-9f7f-9149e89c8a08?P1=1744637464&P2=404&P3=2&P4=AVIu6mvpKj3njWo5xi7YA1Qff%2fG%2bbfbQs8OMm6xmzCsDQ2hLiRqmlHtKfFL0gFFfAgGrS%2fNme6%2bwdS9Wd9wGgw%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1744637463&P2=404&P3=2&P4=cgyBBXve4VXXyjWlY69v0ZjEQ%2fodsYvsw%2ba5bO%2b%2bf9PgzmRLm3G6WCN0tteK5zEV19TxGkKHbxYUweNVougXvQ%3d%3d
unknown
whitelisted
5596
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84d3e481-77df-49da-bc37-0a994069ddb9?P1=1744637468&P2=404&P3=2&P4=dbOsUniUZ5vdd83PfNptb9CQAWoU2dAtd5E%2fxKTyK5EM8OJDHMPv1P7VozIwIwXOwqi56PQtzh1I1Z8mhMuhZw%3d%3d
unknown
whitelisted
5596
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1744637463&P2=404&P3=2&P4=cgyBBXve4VXXyjWlY69v0ZjEQ%2fodsYvsw%2ba5bO%2b%2bf9PgzmRLm3G6WCN0tteK5zEV19TxGkKHbxYUweNVougXvQ%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84d3e481-77df-49da-bc37-0a994069ddb9?P1=1744637468&P2=404&P3=2&P4=dbOsUniUZ5vdd83PfNptb9CQAWoU2dAtd5E%2fxKTyK5EM8OJDHMPv1P7VozIwIwXOwqi56PQtzh1I1Z8mhMuhZw%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84d3e481-77df-49da-bc37-0a994069ddb9?P1=1744637468&P2=404&P3=2&P4=dbOsUniUZ5vdd83PfNptb9CQAWoU2dAtd5E%2fxKTyK5EM8OJDHMPv1P7VozIwIwXOwqi56PQtzh1I1Z8mhMuhZw%3d%3d
unknown
whitelisted
5596
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/84d3e481-77df-49da-bc37-0a994069ddb9?P1=1744637468&P2=404&P3=2&P4=dbOsUniUZ5vdd83PfNptb9CQAWoU2dAtd5E%2fxKTyK5EM8OJDHMPv1P7VozIwIwXOwqi56PQtzh1I1Z8mhMuhZw%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1512
msedge.exe
239.255.255.250:1900
whitelisted
7320
msedge.exe
13.107.43.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7320
msedge.exe
150.171.29.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7320
msedge.exe
93.188.136.129:443
www.gobiernodecanarias.org
Gobierno De Canarias
ES
whitelisted
7320
msedge.exe
13.107.6.158:443
business.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7320
msedge.exe
93.188.137.126:443
www3.gobiernodecanarias.org
Gobierno De Canarias
ES
whitelisted
7320
msedge.exe
13.107.253.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7320
msedge.exe
23.50.131.74:443
bzib.nelreports.net
Akamai International B.V.
DE
whitelisted
7320
msedge.exe
104.126.37.161:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
config.edge.skype.com
  • 13.107.43.16
whitelisted
www3.gobiernodecanarias.org
  • 93.188.137.126
  • 93.188.136.126
whitelisted
edge.microsoft.com
  • 150.171.29.11
  • 150.171.30.11
  • 150.171.27.11
  • 150.171.28.11
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.253.45
whitelisted
bzib.nelreports.net
  • 23.50.131.74
  • 23.50.131.78
whitelisted
www.gobiernodecanarias.org
  • 93.188.136.129
whitelisted
www.bing.com
  • 104.126.37.161
  • 104.126.37.162
  • 104.126.37.178
  • 104.126.37.160
  • 104.126.37.186
  • 104.126.37.171
  • 104.126.37.177
  • 104.126.37.185
  • 104.126.37.179
  • 104.126.37.131
  • 104.126.37.123
  • 104.126.37.129
  • 104.126.37.176
  • 104.126.37.130
whitelisted
f1-eu.readspeaker.com
  • 195.181.175.41
  • 195.181.170.19
  • 212.102.56.179
  • 169.150.255.183
  • 169.150.255.180
  • 207.211.211.27
  • 37.19.194.80
whitelisted
cse.google.com
  • 142.250.185.78
whitelisted

Threats

No threats detected
No debug info