URL:

https://txt.fyi/751100bd01e16eb7

Full analysis: https://app.any.run/tasks/8d248d28-67fe-4507-a246-236facc76d21
Verdict: Malicious activity
Analysis date: April 15, 2025, 18:48:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
phishing
storm1747
tycoon
MD5:

9C3F48EBC99D00C7837F7EAE844844FE

SHA1:

D28303336D5D9F49325DCAF6FD0BEDD5ADDD4D91

SHA256:

FA641A18F4BEE3B2A3B610DED97C111FCBDBE13212AC0D2DE5FBED1B8F4D0B0A

SSDEEP:

3:N8VRsMeUe+xFn:27snT+D

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
0
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details

Process information

No data
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
59
TCP/UDP connections
71
DNS requests
74
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.24.77.37:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
OPTIONS
200
35.190.80.1:443
https://a.nel.cloudflare.com/report/v4?s=y6C5RhwjiNaBbfYVwF9AevISHVR%2FpW9BoGqPajp0mRT85RV7%2BUXdpD0Zp9ojqmQztvxlLtkNfqvHzdStqbXwoyQzd94QiJCNv3m0G9UUGqt1eNlhPYuwS1CeKdOmLpOibW9B
unknown
GET
302
140.82.121.3:443
https://github.com/fent/randexp.js/releases/download/v0.4.3/randexp.min.js
unknown
GET
200
188.114.97.3:443
https://txt.fyi/751100bd01e16eb7
unknown
html
3.90 Kb
GET
200
13.107.253.45:443
https://xpaywalletcdn.azureedge.net/mswallet/ExpressCheckout/v2/GetEligibleSites?version=0&type=topSite&IsStable=false
unknown
binary
497 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6936
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
239.255.255.250:1900
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
188.114.97.3:443
txt.fyi
unknown
104.126.37.177:443
www.bing.com
Akamai International B.V.
DE
whitelisted
13.107.246.45:443
xpaywalletcdn.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
184.24.77.37:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
224.0.0.251:5353
unknown
172.66.0.63:443
godfrey511.hocoos.com
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.206
whitelisted
txt.fyi
  • 188.114.97.3
  • 188.114.96.3
unknown
www.bing.com
  • 104.126.37.177
  • 104.126.37.163
  • 104.126.37.171
  • 104.126.37.123
  • 104.126.37.179
  • 104.126.37.162
  • 104.126.37.178
  • 104.126.37.170
  • 104.126.37.176
  • 104.126.37.160
  • 104.126.37.155
  • 104.126.37.161
  • 104.126.37.130
  • 104.126.37.154
  • 104.126.37.139
  • 104.126.37.131
  • 104.126.37.145
  • 2.19.96.104
  • 2.19.96.91
  • 2.19.96.130
  • 2.19.96.128
  • 2.19.96.88
  • 2.19.96.80
  • 2.19.96.121
  • 2.19.96.90
  • 2.19.96.123
  • 104.126.37.153
  • 104.126.37.137
  • 104.126.37.144
  • 104.126.37.128
  • 104.126.37.185
whitelisted
xpaywalletcdn.azureedge.net
  • 13.107.246.45
whitelisted
crl.microsoft.com
  • 184.24.77.37
  • 184.24.77.35
  • 184.24.77.11
  • 184.24.77.38
  • 184.24.77.6
  • 184.24.77.23
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
godfrey511.hocoos.com
  • 172.66.0.63
  • 162.159.140.63
unknown
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
edgeassetservice.azureedge.net
  • 13.107.246.45
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain (zpimlc .ru)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain (zpimlc .ru)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Generic Phishing domain observed in HTTP Host (DadSec / Storm-1575)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
No debug info