URL: | https://4.timheinrichlaw.com/ |
Full analysis: | https://app.any.run/tasks/df5e7187-e2d3-494b-ab8f-91eda4e4c5fa |
Verdict: | Malicious activity |
Analysis date: | April 15, 2025, 18:22:10 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
MD5: | 395C47DF17D861159917AAD215793AE2 |
SHA1: | AB283C8226CE7DEA9649308F49AA0829C8951694 |
SHA256: | E806EBE8E4A2498353EB3E05FEEDF7B7C415A40532DADAB7F2160ACD77FF187F |
SSDEEP: | 3:N8IC+KIK:2H1IK |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
6124 | RUXIMICS.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3080 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | — | 2.23.227.215:443 | https://www.bing.com/bloomfilterfiles/ExpandedDomainsFilterGlobal.json | unknown | — | — | — |
3080 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4208 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
6124 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3080 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4208 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1396 | msedge.exe | 2.23.227.208:443 | www.bing.com | Ooredoo Q.S.C. | QA | whitelisted |
3080 | MoUsoCoreWorker.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6124 | RUXIMICS.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4208 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3080 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 172.233.49.32:443 | 4.timheinrichlaw.com | Akamai International B.V. | US | unknown |
— | — | 150.171.28.11:443 | edge.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
4.timheinrichlaw.com |
| unknown |
edge.microsoft.com |
| whitelisted |
tesla.com |
| whitelisted |
edgeassetservice.azureedge.net |
| whitelisted |
www.tesla.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Possible Social Engineering Attempted | ET PHISHING Javascript Browser Fingerprinting POST Request |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |
— | — | Misc activity | INFO [ANY.RUN] Possible short link service (t .co) |