File name:

_eab74cb48e2926577d16ea10695b75185ca6c4b36f365c117e1cabe4900c6cd2.txt

Full analysis: https://app.any.run/tasks/505813f2-819d-4fab-87a7-f193f96973f8
Verdict: Malicious activity
Analysis date: August 02, 2025, 04:07:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with very long lines (738)
MD5:

1EA32CF0E9D1919FF2BED1E8D79E3BAF

SHA1:

C13AA7BAB0AF75936E9CA8D43C97D7020632051C

SHA256:

EAB74CB48E2926577D16EA10695B75185CA6C4B36F365C117E1CABE4900C6CD2

SSDEEP:

192:mkaK9ymziLVWOr2jcyOuME+xOpYGJjxKn60W:mNj0OT9Ox

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1056)
    • Deletes shadow copies

      • powershell.exe (PID: 1056)
  • SUSPICIOUS

    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 5236)
      • csc.exe (PID: 3052)
    • Executes as Windows Service

      • VSSVC.exe (PID: 4116)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 5236)
      • csc.exe (PID: 3052)
    • Reads security settings of Internet Explorer

      • StartMenuExperienceHost.exe (PID: 7008)
    • Reads the date of Windows installation

      • StartMenuExperienceHost.exe (PID: 7008)
      • SearchApp.exe (PID: 5676)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 1056)
    • Creates new GUID (POWERSHELL)

      • powershell.exe (PID: 1056)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 1056)
  • INFO

    • Reads the machine GUID from the registry

      • csc.exe (PID: 5236)
      • SearchApp.exe (PID: 5676)
      • csc.exe (PID: 3052)
    • Checks supported languages

      • csc.exe (PID: 5236)
      • cvtres.exe (PID: 3148)
      • TextInputHost.exe (PID: 828)
      • StartMenuExperienceHost.exe (PID: 7008)
      • SearchApp.exe (PID: 5676)
      • csc.exe (PID: 3052)
      • cvtres.exe (PID: 6000)
    • Disables trace logs

      • powershell.exe (PID: 1056)
    • Create files in a temporary directory

      • csc.exe (PID: 5236)
      • cvtres.exe (PID: 3148)
      • csc.exe (PID: 3052)
      • cvtres.exe (PID: 6000)
    • Reads the computer name

      • TextInputHost.exe (PID: 828)
      • StartMenuExperienceHost.exe (PID: 7008)
      • SearchApp.exe (PID: 5676)
    • Checks proxy server information

      • powershell.exe (PID: 1056)
      • SearchApp.exe (PID: 5676)
      • slui.exe (PID: 5308)
    • Process checks computer location settings

      • StartMenuExperienceHost.exe (PID: 7008)
      • SearchApp.exe (PID: 5676)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1056)
    • Reads the software policy settings

      • SearchApp.exe (PID: 5676)
      • slui.exe (PID: 5308)
    • Reads Environment values

      • SearchApp.exe (PID: 5676)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4820)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 1056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
153
Monitored processes
15
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs vssadmin.exe conhost.exe no specs csc.exe vssvc.exe no specs cvtres.exe no specs startmenuexperiencehost.exe no specs textinputhost.exe no specs searchapp.exe csc.exe cvtres.exe no specs notepad.exe no specs mobsync.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
828"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
1056"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\Desktop\_eab74cb48e2926577d16ea10695b75185ca6c4b36f365c117e1cabe4900c6cd2.txt.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1508"C:\WINDOWS\system32\vssadmin.exe" delete shadows /all /quiet C:\Windows\System32\vssadmin.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\combase.dll
1592\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exevssadmin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2384C:\WINDOWS\System32\mobsync.exe -EmbeddingC:\Windows\System32\mobsync.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Sync Center
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mobsync.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3052"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\yoaog0n2.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
3148C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESE990.tmp" "c:\Users\admin\AppData\Local\Temp\CSC259B4C097B44722AB5F43A9371E479F.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_clr0400.dll
4116C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4820"C:\WINDOWS\system32\notepad.exe" C:\Users\admin\Desktop\IMPORTANT.txt C:\Windows\System32\notepad.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5236"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\chnzw540.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
Total events
26 570
Read events
26 493
Write events
74
Delete events
3

Modification events

(PID) Process:(7008) StartMenuExperienceHost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TileDataModel\Migration\StartNonLayoutProperties
Operation:writeName:Completed
Value:
1
(PID) Process:(7008) StartMenuExperienceHost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TileDataModel\Migration\StartNonLayoutProperties_AppUsageData
Operation:writeName:Completed
Value:
1
(PID) Process:(7008) StartMenuExperienceHost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\TileDataModel\Migration\StartNonLayoutProperties_TargetedContentTiles
Operation:writeName:Completed
Value:
1
(PID) Process:(5676) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:writeName:CachedFeatureString
Value:
(PID) Process:(7008) StartMenuExperienceHost.exeKey:\REGISTRY\A\{33d3e75b-3ce0-3cb8-a5e6-26f939fcc9ad}\LocalState\DataCorruptionRecovery
Operation:writeName:InitializationAttemptCount
Value:
01000000B0C3C3FB6203DC01
(PID) Process:(7008) StartMenuExperienceHost.exeKey:\REGISTRY\A\{33d3e75b-3ce0-3cb8-a5e6-26f939fcc9ad}\LocalState\DataCorruptionRecovery
Operation:writeName:InitializationAttemptCount
Value:
0000000063F1E9FB6203DC01
(PID) Process:(5676) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:SafeSearchMode
Value:
1
(PID) Process:(5676) SearchApp.exeKey:\REGISTRY\A\{0836b6ad-4f87-ba82-0a59-17a21df12247}\LocalState
Operation:writeName:BINGIDENTITY_PROP_USEREMAIL
Value:
0000ED8D06FC6203DC01
(PID) Process:(5676) SearchApp.exeKey:\REGISTRY\A\{0836b6ad-4f87-ba82-0a59-17a21df12247}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPETEXT
Value:
000015F108FC6203DC01
(PID) Process:(5676) SearchApp.exeKey:\REGISTRY\A\{0836b6ad-4f87-ba82-0a59-17a21df12247}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
000015F108FC6203DC01
Executable files
2
Suspicious files
62
Text files
93
Unknown types
7

Dropped files

PID
Process
Filename
Type
1056powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_v5emcnho.4px.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1056powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EF3SR19WZHVJRQQDPWZQ.tempbinary
MD5:AECC159C182B1D1CE9C45E3C76324467
SHA256:EF506B339BA6C7987F8266FFA1656364ADB2D4E4286F24572973E9362FE92C4D
1056powershell.exeC:\Users\admin\AppData\Local\Temp\chnzw540.cmdlinetext
MD5:D411CDDF0D97F4B7B34329555C7E168F
SHA256:30B199E8D652C6C19DC1B6773E9480392A975E13033A05B117C262BFAF47CAAA
1056powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF18dc22.TMPbinary
MD5:00A03B286E6E0EBFF8D9C492365D5EC2
SHA256:4DBFC417D053BA6867308671F1C61F4DCAFC61F058D4044DB532DA6D3BDE3615
3052csc.exeC:\Users\admin\AppData\Local\Temp\CSCB50D8D3FBA4B6C8E545C2F892C5C53.TMPres
MD5:5BB520DB6955D18A41EBC76195A8D8CF
SHA256:00F0BECA4FA26CA62F0671D89AC08E1A460B96F38A791D10EF0D8776178C5135
5236csc.exeC:\Users\admin\AppData\Local\Temp\chnzw540.outtext
MD5:EFF1D29C7487311514196FB1097FA325
SHA256:D30D0A58CD5B900F6828FD7C52BB225A6E2FB6020EEB15D3DB405F6BFB02BA44
1056powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_cntpxvyb.2dk.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5236csc.exeC:\Users\admin\AppData\Local\Temp\chnzw540.dllexecutable
MD5:A93C15316AEB5AE3DE831F199E7CE1F7
SHA256:F9F0AFE491C7D18441DCE9F857BC336693DEC57A527ADD45DD7A63E77733A36E
1056powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:AECC159C182B1D1CE9C45E3C76324467
SHA256:EF506B339BA6C7987F8266FFA1656364ADB2D4E4286F24572973E9362FE92C4D
3052csc.exeC:\Users\admin\AppData\Local\Temp\yoaog0n2.outtext
MD5:C9F877CC2F6B88E77FB301199E5CFE8C
SHA256:D5AE66B691EBFE113418D90272E3BCA984D3B3BA767CD7F4F3B871F057F0C949
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
22
DNS requests
9
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3584
RUXIMICS.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3584
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
92.123.104.52:443
https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
unknown
html
132 Kb
whitelisted
GET
200
92.123.104.31:443
https://www.bing.com/manifest/threshold.appcache
unknown
text
2.97 Kb
whitelisted
POST
204
92.123.104.62:443
https://www.bing.com/threshold/xls.aspx
unknown
whitelisted
GET
200
92.123.104.38:443
https://www.bing.com/rb/16/jnc,nj/-M-8YWX0KlEtdAHVrkTvKQHOghs.js?bu=Dicwe4sBkgGVAYgBgQGFAcABwwEwuAHGAQ&or=w
unknown
binary
22.0 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3584
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3584
RUXIMICS.exe
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
wallpapercave.com
  • 172.66.169.189
  • 104.20.34.47
whitelisted
www.bing.com
  • 92.123.104.31
  • 92.123.104.63
  • 92.123.104.34
  • 92.123.104.33
  • 92.123.104.62
  • 92.123.104.38
  • 92.123.104.52
  • 92.123.104.32
whitelisted
self.events.data.microsoft.com
  • 104.208.16.89
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
No debug info