File name:

a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe

Full analysis: https://app.any.run/tasks/28beb162-68a2-4997-b55f-9beab9c7b31f
Verdict: Malicious activity
Analysis date: May 19, 2024, 10:03:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

A90CD8FD0655A0C615033AE787D46D20

SHA1:

D5A9763E72C5AC8496B693855A1976034B507958

SHA256:

A59415F610CB88DF3B27DD6A73ED659358D1AA18E09C89A6B71BB6967F6E784A

SSDEEP:

3072:R0+sO3QZLqIlCubM+EMVezSFW3EFySfAb0LUorn5lCA8TA2Mn1klaQGd6yjquXWJ:RX3QZLqIlCubM+EMVkSFW3uySfAb0LUx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • powershell.exe (PID: 6340)
      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • mkpuz.exe (PID: 7020)
      • xaiixu.exe (PID: 6968)
      • reaiha.exe (PID: 7072)
      • xatot.exe (PID: 6200)
      • pqfiic.exe (PID: 7124)
      • veeiqo.exe (PID: 2528)
      • geumaa.exe (PID: 2280)
      • beiyoir.exe (PID: 4940)
      • tuouxiv.exe (PID: 5720)
      • jeece.exe (PID: 5716)
      • vimew.exe (PID: 3528)
      • zeoeda.exe (PID: 400)
      • rojox.exe (PID: 6204)
      • hhpeq.exe (PID: 1492)
      • nosoc.exe (PID: 6184)
      • hxdam.exe (PID: 6152)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • qiibiu.exe (PID: 6552)
      • huiobop.exe (PID: 5944)
      • puira.exe (PID: 6440)
      • tsyen.exe (PID: 6648)
      • wryal.exe (PID: 1324)
      • fiedao.exe (PID: 6848)
      • fywic.exe (PID: 780)
      • miewu.exe (PID: 6464)
      • pbrief.exe (PID: 2312)
      • luuuze.exe (PID: 4708)
      • cooolac.exe (PID: 2740)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • maate.exe (PID: 6300)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • ckmip.exe (PID: 1256)
      • keuho.exe (PID: 2132)
      • gaosuo.exe (PID: 1680)
      • gnqaiy.exe (PID: 2696)
      • roaewof.exe (PID: 588)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
    • Changes the Windows auto-update feature

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • xaiixu.exe (PID: 6968)
      • yaagii.exe (PID: 6920)
      • reaiha.exe (PID: 7072)
      • mkpuz.exe (PID: 7020)
      • pqfiic.exe (PID: 7124)
      • geumaa.exe (PID: 2280)
      • xatot.exe (PID: 6200)
      • veeiqo.exe (PID: 2528)
      • tuouxiv.exe (PID: 5720)
      • jeece.exe (PID: 5716)
      • beiyoir.exe (PID: 4940)
      • zeoeda.exe (PID: 400)
      • vimew.exe (PID: 3528)
      • rojox.exe (PID: 6204)
      • hhpeq.exe (PID: 1492)
      • hxdam.exe (PID: 6152)
      • nrdak.exe (PID: 1440)
      • nosoc.exe (PID: 6184)
      • qiibiu.exe (PID: 6552)
      • huiobop.exe (PID: 5944)
      • paoesit.exe (PID: 4480)
      • puira.exe (PID: 6440)
      • fiedao.exe (PID: 6848)
      • tsyen.exe (PID: 6648)
      • fywic.exe (PID: 780)
      • wryal.exe (PID: 1324)
      • pbrief.exe (PID: 2312)
      • luuuze.exe (PID: 4708)
      • miewu.exe (PID: 6464)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • cooolac.exe (PID: 2740)
      • daqob.exe (PID: 800)
      • maate.exe (PID: 6300)
      • keuho.exe (PID: 2132)
      • kauyi.exe (PID: 7028)
      • ckmip.exe (PID: 1256)
      • gaosuo.exe (PID: 1680)
      • roaewof.exe (PID: 588)
      • gnqaiy.exe (PID: 2696)
      • ziagux.exe (PID: 3756)
      • voueh.exe (PID: 2460)
    • Changes appearance of the Explorer extensions

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • reaiha.exe (PID: 7072)
      • pqfiic.exe (PID: 7124)
      • xatot.exe (PID: 6200)
      • geumaa.exe (PID: 2280)
      • beiyoir.exe (PID: 4940)
      • veeiqo.exe (PID: 2528)
      • tuouxiv.exe (PID: 5720)
      • jeece.exe (PID: 5716)
      • zeoeda.exe (PID: 400)
      • vimew.exe (PID: 3528)
      • hhpeq.exe (PID: 1492)
      • rojox.exe (PID: 6204)
      • hxdam.exe (PID: 6152)
      • nosoc.exe (PID: 6184)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • qiibiu.exe (PID: 6552)
      • huiobop.exe (PID: 5944)
      • tsyen.exe (PID: 6648)
      • puira.exe (PID: 6440)
      • fiedao.exe (PID: 6848)
      • wryal.exe (PID: 1324)
      • fywic.exe (PID: 780)
      • pbrief.exe (PID: 2312)
      • luuuze.exe (PID: 4708)
      • miewu.exe (PID: 6464)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • cooolac.exe (PID: 2740)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • maate.exe (PID: 6300)
      • keuho.exe (PID: 2132)
      • gaosuo.exe (PID: 1680)
      • ckmip.exe (PID: 1256)
      • roaewof.exe (PID: 588)
      • gnqaiy.exe (PID: 2696)
      • ziagux.exe (PID: 3756)
      • voueh.exe (PID: 2460)
    • Changes the autorun value in the registry

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • reaiha.exe (PID: 7072)
      • pqfiic.exe (PID: 7124)
      • xatot.exe (PID: 6200)
      • geumaa.exe (PID: 2280)
      • beiyoir.exe (PID: 4940)
      • veeiqo.exe (PID: 2528)
      • tuouxiv.exe (PID: 5720)
      • jeece.exe (PID: 5716)
      • vimew.exe (PID: 3528)
      • zeoeda.exe (PID: 400)
      • hhpeq.exe (PID: 1492)
      • hxdam.exe (PID: 6152)
      • rojox.exe (PID: 6204)
      • nosoc.exe (PID: 6184)
      • nrdak.exe (PID: 1440)
      • qiibiu.exe (PID: 6552)
      • paoesit.exe (PID: 4480)
      • huiobop.exe (PID: 5944)
      • puira.exe (PID: 6440)
      • fiedao.exe (PID: 6848)
      • tsyen.exe (PID: 6648)
      • wryal.exe (PID: 1324)
      • fywic.exe (PID: 780)
      • pbrief.exe (PID: 2312)
      • luuuze.exe (PID: 4708)
      • miewu.exe (PID: 6464)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • cooolac.exe (PID: 2740)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • maate.exe (PID: 6300)
      • keuho.exe (PID: 2132)
      • ckmip.exe (PID: 1256)
      • gaosuo.exe (PID: 1680)
      • roaewof.exe (PID: 588)
      • gnqaiy.exe (PID: 2696)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • reaiha.exe (PID: 7072)
      • pqfiic.exe (PID: 7124)
      • xatot.exe (PID: 6200)
      • geumaa.exe (PID: 2280)
      • veeiqo.exe (PID: 2528)
      • beiyoir.exe (PID: 4940)
      • jeece.exe (PID: 5716)
      • vimew.exe (PID: 3528)
      • tuouxiv.exe (PID: 5720)
      • zeoeda.exe (PID: 400)
      • rojox.exe (PID: 6204)
      • hhpeq.exe (PID: 1492)
      • hxdam.exe (PID: 6152)
      • nrdak.exe (PID: 1440)
      • nosoc.exe (PID: 6184)
      • qiibiu.exe (PID: 6552)
      • paoesit.exe (PID: 4480)
      • huiobop.exe (PID: 5944)
      • tsyen.exe (PID: 6648)
      • puira.exe (PID: 6440)
      • fiedao.exe (PID: 6848)
      • fywic.exe (PID: 780)
      • wryal.exe (PID: 1324)
      • pbrief.exe (PID: 2312)
      • miewu.exe (PID: 6464)
      • luuuze.exe (PID: 4708)
      • gljaok.exe (PID: 5548)
      • cooolac.exe (PID: 2740)
      • hoiequh.exe (PID: 6856)
      • maate.exe (PID: 6300)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • keuho.exe (PID: 2132)
      • ckmip.exe (PID: 1256)
      • gaosuo.exe (PID: 1680)
      • gnqaiy.exe (PID: 2696)
      • roaewof.exe (PID: 588)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
    • Reads security settings of Internet Explorer

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • reaiha.exe (PID: 7072)
      • xatot.exe (PID: 6200)
      • pqfiic.exe (PID: 7124)
      • geumaa.exe (PID: 2280)
      • veeiqo.exe (PID: 2528)
      • beiyoir.exe (PID: 4940)
      • jeece.exe (PID: 5716)
      • tuouxiv.exe (PID: 5720)
      • vimew.exe (PID: 3528)
      • zeoeda.exe (PID: 400)
      • rojox.exe (PID: 6204)
      • hhpeq.exe (PID: 1492)
      • nosoc.exe (PID: 6184)
      • hxdam.exe (PID: 6152)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • qiibiu.exe (PID: 6552)
      • huiobop.exe (PID: 5944)
      • tsyen.exe (PID: 6648)
      • puira.exe (PID: 6440)
      • fiedao.exe (PID: 6848)
      • wryal.exe (PID: 1324)
      • fywic.exe (PID: 780)
      • pbrief.exe (PID: 2312)
      • miewu.exe (PID: 6464)
      • luuuze.exe (PID: 4708)
      • cooolac.exe (PID: 2740)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • maate.exe (PID: 6300)
      • ckmip.exe (PID: 1256)
      • keuho.exe (PID: 2132)
      • gaosuo.exe (PID: 1680)
      • gnqaiy.exe (PID: 2696)
      • roaewof.exe (PID: 588)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
    • Executable content was dropped or overwritten

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • reaiha.exe (PID: 7072)
      • pqfiic.exe (PID: 7124)
      • xatot.exe (PID: 6200)
      • veeiqo.exe (PID: 2528)
      • geumaa.exe (PID: 2280)
      • beiyoir.exe (PID: 4940)
      • jeece.exe (PID: 5716)
      • tuouxiv.exe (PID: 5720)
      • vimew.exe (PID: 3528)
      • hhpeq.exe (PID: 1492)
      • zeoeda.exe (PID: 400)
      • rojox.exe (PID: 6204)
      • hxdam.exe (PID: 6152)
      • nosoc.exe (PID: 6184)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • qiibiu.exe (PID: 6552)
      • puira.exe (PID: 6440)
      • huiobop.exe (PID: 5944)
      • tsyen.exe (PID: 6648)
      • fiedao.exe (PID: 6848)
      • wryal.exe (PID: 1324)
      • fywic.exe (PID: 780)
      • miewu.exe (PID: 6464)
      • pbrief.exe (PID: 2312)
      • luuuze.exe (PID: 4708)
      • cooolac.exe (PID: 2740)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • maate.exe (PID: 6300)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • ckmip.exe (PID: 1256)
      • keuho.exe (PID: 2132)
      • gaosuo.exe (PID: 1680)
      • gnqaiy.exe (PID: 2696)
      • roaewof.exe (PID: 588)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
  • INFO

    • Reads the computer name

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • reaiha.exe (PID: 7072)
      • pqfiic.exe (PID: 7124)
      • xatot.exe (PID: 6200)
      • veeiqo.exe (PID: 2528)
      • geumaa.exe (PID: 2280)
      • beiyoir.exe (PID: 4940)
      • tuouxiv.exe (PID: 5720)
      • jeece.exe (PID: 5716)
      • vimew.exe (PID: 3528)
      • hhpeq.exe (PID: 1492)
      • zeoeda.exe (PID: 400)
      • rojox.exe (PID: 6204)
      • nosoc.exe (PID: 6184)
      • hxdam.exe (PID: 6152)
      • qiibiu.exe (PID: 6552)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • puira.exe (PID: 6440)
      • huiobop.exe (PID: 5944)
      • tsyen.exe (PID: 6648)
      • wryal.exe (PID: 1324)
      • fiedao.exe (PID: 6848)
      • fywic.exe (PID: 780)
      • miewu.exe (PID: 6464)
      • pbrief.exe (PID: 2312)
      • luuuze.exe (PID: 4708)
      • gljaok.exe (PID: 5548)
      • cooolac.exe (PID: 2740)
      • hoiequh.exe (PID: 6856)
      • daqob.exe (PID: 800)
      • maate.exe (PID: 6300)
      • kauyi.exe (PID: 7028)
      • ckmip.exe (PID: 1256)
      • keuho.exe (PID: 2132)
      • gaosuo.exe (PID: 1680)
      • roaewof.exe (PID: 588)
      • gnqaiy.exe (PID: 2696)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
    • Checks supported languages

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • mkpuz.exe (PID: 7020)
      • pqfiic.exe (PID: 7124)
      • reaiha.exe (PID: 7072)
      • geumaa.exe (PID: 2280)
      • xatot.exe (PID: 6200)
      • veeiqo.exe (PID: 2528)
      • tuouxiv.exe (PID: 5720)
      • beiyoir.exe (PID: 4940)
      • vimew.exe (PID: 3528)
      • jeece.exe (PID: 5716)
      • zeoeda.exe (PID: 400)
      • hhpeq.exe (PID: 1492)
      • rojox.exe (PID: 6204)
      • hxdam.exe (PID: 6152)
      • nosoc.exe (PID: 6184)
      • qiibiu.exe (PID: 6552)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • huiobop.exe (PID: 5944)
      • fiedao.exe (PID: 6848)
      • tsyen.exe (PID: 6648)
      • wryal.exe (PID: 1324)
      • pbrief.exe (PID: 2312)
      • fywic.exe (PID: 780)
      • miewu.exe (PID: 6464)
      • luuuze.exe (PID: 4708)
      • gljaok.exe (PID: 5548)
      • cooolac.exe (PID: 2740)
      • daqob.exe (PID: 800)
      • hoiequh.exe (PID: 6856)
      • maate.exe (PID: 6300)
      • keuho.exe (PID: 2132)
      • kauyi.exe (PID: 7028)
      • ckmip.exe (PID: 1256)
      • gaosuo.exe (PID: 1680)
      • roaewof.exe (PID: 588)
      • gnqaiy.exe (PID: 2696)
      • voueh.exe (PID: 2460)
      • piemor.exe (PID: 4604)
      • ziagux.exe (PID: 3756)
      • puira.exe (PID: 6440)
    • Process checks computer location settings

      • a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe (PID: 6572)
      • yaagii.exe (PID: 6920)
      • xaiixu.exe (PID: 6968)
      • reaiha.exe (PID: 7072)
      • mkpuz.exe (PID: 7020)
      • pqfiic.exe (PID: 7124)
      • xatot.exe (PID: 6200)
      • geumaa.exe (PID: 2280)
      • beiyoir.exe (PID: 4940)
      • veeiqo.exe (PID: 2528)
      • tuouxiv.exe (PID: 5720)
      • jeece.exe (PID: 5716)
      • vimew.exe (PID: 3528)
      • zeoeda.exe (PID: 400)
      • rojox.exe (PID: 6204)
      • hhpeq.exe (PID: 1492)
      • hxdam.exe (PID: 6152)
      • nosoc.exe (PID: 6184)
      • nrdak.exe (PID: 1440)
      • paoesit.exe (PID: 4480)
      • qiibiu.exe (PID: 6552)
      • huiobop.exe (PID: 5944)
      • tsyen.exe (PID: 6648)
      • puira.exe (PID: 6440)
      • fiedao.exe (PID: 6848)
      • fywic.exe (PID: 780)
      • wryal.exe (PID: 1324)
      • pbrief.exe (PID: 2312)
      • miewu.exe (PID: 6464)
      • luuuze.exe (PID: 4708)
      • cooolac.exe (PID: 2740)
      • gljaok.exe (PID: 5548)
      • hoiequh.exe (PID: 6856)
      • daqob.exe (PID: 800)
      • kauyi.exe (PID: 7028)
      • maate.exe (PID: 6300)
      • keuho.exe (PID: 2132)
      • gaosuo.exe (PID: 1680)
      • ckmip.exe (PID: 1256)
      • roaewof.exe (PID: 588)
      • gnqaiy.exe (PID: 2696)
      • voueh.exe (PID: 2460)
      • ziagux.exe (PID: 3756)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:04:10 21:59:09+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 102400
InitializedDataSize: 20480
UninitializedDataSize: -
EntryPoint: 0x1164
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
47
Malicious processes
44
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe no specs conhost.exe no specs a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exe yaagii.exe xaiixu.exe mkpuz.exe reaiha.exe pqfiic.exe xatot.exe geumaa.exe veeiqo.exe beiyoir.exe tuouxiv.exe jeece.exe vimew.exe zeoeda.exe hhpeq.exe rojox.exe hxdam.exe nosoc.exe nrdak.exe qiibiu.exe paoesit.exe huiobop.exe puira.exe tsyen.exe filecoauth.exe no specs fiedao.exe wryal.exe fywic.exe pbrief.exe miewu.exe luuuze.exe gljaok.exe cooolac.exe hoiequh.exe daqob.exe maate.exe kauyi.exe keuho.exe ckmip.exe gaosuo.exe roaewof.exe gnqaiy.exe voueh.exe ziagux.exe piemor.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
400"C:\Users\admin\zeoeda.exe" C:\Users\admin\zeoeda.exe
vimew.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\zeoeda.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
588"C:\Users\admin\roaewof.exe" C:\Users\admin\roaewof.exe
gaosuo.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\roaewof.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
780"C:\Users\admin\fywic.exe" C:\Users\admin\fywic.exe
wryal.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\fywic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
800"C:\Users\admin\daqob.exe" C:\Users\admin\daqob.exe
hoiequh.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\daqob.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1256"C:\Users\admin\ckmip.exe" C:\Users\admin\ckmip.exe
keuho.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\ckmip.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1324"C:\Users\admin\wryal.exe" C:\Users\admin\wryal.exe
fiedao.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\wryal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1440"C:\Users\admin\nrdak.exe" C:\Users\admin\nrdak.exe
nosoc.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\nrdak.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1492"C:\Users\admin\hhpeq.exe" C:\Users\admin\hhpeq.exe
zeoeda.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\hhpeq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1680"C:\Users\admin\gaosuo.exe" C:\Users\admin\gaosuo.exe
ckmip.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\gaosuo.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
2132"C:\Users\admin\keuho.exe" C:\Users\admin\keuho.exe
kauyi.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\keuho.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
Total events
169 063
Read events
168 550
Write events
513
Delete events
0

Modification events

(PID) Process:(6340) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6340) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6340) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6340) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6572) a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6572) a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6572) a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6572) a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6572) a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:yaagii
Value:
C:\Users\admin\yaagii.exe /P
(PID) Process:(6572) a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Operation:writeName:ShowSuperHidden
Value:
0
Executable files
43
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6340powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4LZN8SX3451MGPF1VZVI.temp
MD5:
SHA256:
6340powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fnou23ek.303.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6340powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF11370b.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
2528veeiqo.exeC:\Users\admin\beiyoir.exeexecutable
MD5:B7BF72ECD9E6209FA867B992247B7E3C
SHA256:8A26AC7B34DAB9154A1C9CE3CD5040C2BEB341B221FC53EBE44775EEBB3949F8
6968xaiixu.exeC:\Users\admin\mkpuz.exeexecutable
MD5:65A355F25419AC65F6212A850BEFA61F
SHA256:5825ECD02C849BE214E020F5C7EC54224233061E346855F1FC594884D885895F
7072reaiha.exeC:\Users\admin\pqfiic.exeexecutable
MD5:59A5C816D39123A151C8061B7236E8B9
SHA256:7CEF2B0562739F59730D76B50B339C32C1C740B3629C200A51931446BA1AACDC
6340powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:ADC70493E7402A34D5BCFDEF67B35E88
SHA256:7FB6473656010A5F8F2378CB02886C728FE83EE3D0B4EB637BD9B3CF37B59344
6200xatot.exeC:\Users\admin\geumaa.exeexecutable
MD5:9F718A931B680E91921FF7C026BA8B81
SHA256:BC42936859D02B056356C73E57BA362C127D98BA22AC594E780DDC5DEDEE4FC5
7020mkpuz.exeC:\Users\admin\reaiha.exeexecutable
MD5:670BABBCAFF7F3106638053AA43E0A9F
SHA256:5738E911762F047A7462AA17B8C4DF74D7285D5E915D7613296BA9DDDC737CB0
6572a59415f610cb88df3b27dd6a73ed659358d1aa18e09c89a6b71bb6967f6e784a.exeC:\Users\admin\yaagii.exeexecutable
MD5:4DAA93B2033F506DC969CD078AF651CD
SHA256:7665D686CA917C4A436F9B48C08D9C687A9869759679721D6EABBC8BA463A90A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
22
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
4232
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
5140
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
4232
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5140
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
5944
RUXIMICS.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
2908
OfficeClickToRun.exe
POST
200
51.132.193.105:443
https://self.events.data.microsoft.com/OneCollector/1.0/
unknown
binary
9 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4364
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
whitelisted
4232
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5944
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5140
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4232
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5944
RUXIMICS.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5140
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5944
RUXIMICS.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown
4232
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
ns1.spansearcher.net
  • 49.13.77.253
unknown
self.events.data.microsoft.com
  • 20.42.65.85
whitelisted

Threats

No threats detected
No debug info