URL:

swpcwtyx3po5qs27656rhmnsitdcz2j4xutjafjje5gb3enmax42toyd.onion

Full analysis: https://app.any.run/tasks/2d21e2c0-70c1-48f0-9408-104b14fcfe31
Verdict: Malicious activity
Analysis date: June 25, 2025, 20:23:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
tor2web
phishing
arch-scr
arch-html
Indicators:
MD5:

825EE0DE886E1982BE612969932012B7

SHA1:

A651245E735D115F6DA728D4FF044F08C8E6038E

SHA256:

FACB765113F11EB0666508D9137C855C8032A36D8311DF92A4985AA220CC0DB0

SSDEEP:

3:9TKQUUNIiQqfXTKhXRHoL/:9TKPiQuDMRU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • msedge.exe (PID: 6492)
    • TOR2WEB has been detected (SURICATA)

      • msedge.exe (PID: 6492)
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • msedge.exe (PID: 6492)
      • svchost.exe (PID: 2200)
    • Block-list domains

      • msedge.exe (PID: 6492)
    • The process executes via Task Scheduler

      • updater.exe (PID: 7200)
    • There is functionality for taking screenshot (YARA)

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • The process creates files with name similar to system file names

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Process drops legitimate windows executable

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Executable content was dropped or overwritten

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Reads the date of Windows installation

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Reads security settings of Internet Explorer

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Application launched itself

      • firefox.exe (PID: 2508)
      • firefox.exe (PID: 5716)
      • updater.exe (PID: 7200)
    • Connects to unusual port

      • tor.exe (PID: 7704)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 7540)
      • updater.exe (PID: 7200)
      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
      • firefox.exe (PID: 2508)
      • firefox.exe (PID: 6840)
      • firefox.exe (PID: 8092)
      • firefox.exe (PID: 3636)
      • tor.exe (PID: 7704)
      • firefox.exe (PID: 5716)
      • firefox.exe (PID: 5220)
      • firefox.exe (PID: 7852)
      • updater.exe (PID: 8180)
      • firefox.exe (PID: 6648)
      • firefox.exe (PID: 7308)
      • firefox.exe (PID: 8172)
      • firefox.exe (PID: 8548)
      • firefox.exe (PID: 8904)
      • firefox.exe (PID: 5432)
    • Reads Environment values

      • identity_helper.exe (PID: 7540)
    • Reads the computer name

      • identity_helper.exe (PID: 7540)
      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
      • firefox.exe (PID: 5716)
      • firefox.exe (PID: 6840)
      • firefox.exe (PID: 5220)
      • firefox.exe (PID: 3636)
      • firefox.exe (PID: 8092)
      • updater.exe (PID: 7200)
      • firefox.exe (PID: 8172)
      • firefox.exe (PID: 5432)
      • tor.exe (PID: 7704)
      • firefox.exe (PID: 7308)
      • firefox.exe (PID: 6648)
      • firefox.exe (PID: 8548)
      • firefox.exe (PID: 8904)
      • firefox.exe (PID: 7852)
    • Application launched itself

      • msedge.exe (PID: 4984)
    • Checks proxy server information

      • slui.exe (PID: 188)
    • Reads the software policy settings

      • slui.exe (PID: 188)
    • The sample compiled with english language support

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 4984)
    • Process checks computer location settings

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
      • firefox.exe (PID: 5716)
    • Creates files or folders in the user directory

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
    • Reads CPU info

      • firefox.exe (PID: 5716)
      • firefox.exe (PID: 5432)
    • Creates files in the program directory

      • firefox.exe (PID: 5716)
    • Reads the machine GUID from the registry

      • tor.exe (PID: 7704)
      • firefox.exe (PID: 5716)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 7200)
    • Reads Microsoft Office registry keys

      • firefox.exe (PID: 5716)
    • Create files in a temporary directory

      • tor-browser-windows-x86_64-portable-14.5.4.exe (PID: 7308)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
225
Monitored processes
79
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs #TOR2WEB msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs updater.exe no specs updater.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs tor-browser-windows-x86_64-portable-14.5.4.exe msedge.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs tor.exe conhost.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
420"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=7912,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=8116 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
536"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=7796,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=7768 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4264,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=4304 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=7400,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=7928 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=4284,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
788"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=5484,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=5712 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1156"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=1584,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=7728,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1520"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=5312,i,4697011514777410059,12814932747225591118,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
21 768
Read events
21 702
Write events
63
Delete events
3

Modification events

(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4984) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
685BCF8001972F00
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\787138
Operation:writeName:WindowTabManagerFileMappingId
Value:
{56A68113-F1FA-4316-91DF-7DD8558F799C}
(PID) Process:(4984) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
2683EA8001972F00
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
Operation:writeName:EnhancedLinkOpeningDefault
Value:
Default
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\787138
Operation:writeName:WindowTabManagerFileMappingId
Value:
{BB00D4F2-5C8C-4FAD-9FDA-F0028B2CF775}
(PID) Process:(4984) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\787138
Operation:writeName:WindowTabManagerFileMappingId
Value:
{E924ED8B-B894-4D47-9A31-26C454CFFF7F}
Executable files
27
Suspicious files
680
Text files
217
Unknown types
206

Dropped files

PID
Process
Filename
Type
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RF175da0.TMP
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF175da0.TMP
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF175da0.TMP
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF175db0.TMP
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF175db0.TMP
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF175db0.TMP
MD5:
SHA256:
4984msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
35
TCP/UDP connections
168
DNS requests
262
Threats
62

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
whitelisted
6492
msedge.exe
GET
200
104.126.37.152:80
http://r10.i.lencr.org/
DE
binary
1.22 Kb
whitelisted
6492
msedge.exe
GET
200
150.171.28.11:80
http://edge.microsoft.com/browsernetworktime/time/1/current?cup2key=2:ik4L-OaXQL2Jw4kRz01Bp3R-vQgC6jKZ7PGPdt2wTdo&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
US
text
101 b
whitelisted
6492
msedge.exe
GET
200
185.53.178.34:80
http://swpcwtyx3po5qs27656rhmnsitdcz2j4xutjafjje5gb3enmax42toyd.onion.ws/favicon.ico
DE
compressed
1.29 Kb
malicious
7020
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
814 b
whitelisted
592
svchost.exe
HEAD
200
208.89.74.21:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bf8090eb-6e5c-4c51-9250-5bf9b46cf160?P1=1751087277&P2=404&P3=2&P4=fHCUfef24mXd8yFGURtWSaew3AYy7%2f9bf7k%2bGB4bqCQVLTJqrTwLvk4fNliiwGAZz%2fmhieOevsSsehj7d%2bShvw%3d%3d
US
whitelisted
6492
msedge.exe
GET
200
185.53.178.34:80
http://swpcwtyx3po5qs27656rhmnsitdcz2j4xutjafjje5gb3enmax42toyd.onion.ws/
DE
html
1.29 Kb
malicious
6492
msedge.exe
GET
201
185.53.178.34:80
http://swpcwtyx3po5qs27656rhmnsitdcz2j4xutjafjje5gb3enmax42toyd.onion.ws/munin/a/ls?t=685c5ad9&token=1a95821612e903c6e5c7c595e7bd908e737130bf
DE
compressed
1.29 Kb
malicious
592
svchost.exe
GET
200
208.89.74.21:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/4c4fdee0-d69c-42b7-bf5c-3ec046e9dfc9?P1=1751087279&P2=404&P3=2&P4=l2aROqTBYSaH64Dwz9neIIYJX3TNE8GrNLvUkjAYVX%2f23W5fzdLfoMOm%2bvD9WvaWDAM3IZdL4Ql2JzHHbACatQ%3d%3d
US
binary
2.98 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6980
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6492
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6492
msedge.exe
150.171.28.11:80
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6492
msedge.exe
150.171.27.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6492
msedge.exe
104.126.37.169:443
copilot.microsoft.com
Akamai International B.V.
DE
whitelisted
6492
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 216.58.212.174
  • 142.250.186.46
  • 172.217.18.110
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
swpcwtyx3po5qs27656rhmnsitdcz2j4xutjafjje5gb3enmax42toyd.onion
unknown
copilot.microsoft.com
  • 104.126.37.169
whitelisted
update.googleapis.com
  • 216.58.206.35
whitelisted
www.bing.com
  • 104.126.37.144
  • 104.126.37.170
  • 104.126.37.154
  • 104.126.37.153
  • 104.126.37.161
  • 104.126.37.176
  • 104.126.37.160
  • 104.126.37.162
  • 104.126.37.177
  • 104.126.37.185
  • 104.126.37.186
  • 104.126.37.171
  • 104.126.37.178
  • 104.126.37.128
  • 104.126.37.123
  • 104.126.37.179
  • 104.126.37.163
  • 104.126.37.139
  • 104.126.37.131
  • 104.126.37.136
  • 2.23.227.208
  • 2.23.227.215
whitelisted
edgeassetservice.azureedge.net
  • 13.107.253.45
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted

Threats

PID
Process
Class
Message
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
6492
msedge.exe
Potential Corporate Privacy Violation
ET INFO DNS Query for TOR Hidden Domain .onion Accessible Via TOR
No debug info