| File name: | 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched |
| Full analysis: | https://app.any.run/tasks/28923a89-7e50-4040-b8a6-fbe6aa227abc |
| Verdict: | Malicious activity |
| Analysis date: | July 27, 2025, 15:25:56 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections |
| MD5: | AD6F2E6F62118EE7AC7452681B98CBF2 |
| SHA1: | 5F0FD0F0A971859C20B2ADBA21D1D81785DBC84C |
| SHA256: | BF2CEFDB18231CC25C0FDEC5FA0B966B9EDFA51B9AE4A0D056B6014975864E47 |
| SSDEEP: | 12288:N5KvSFU/g49YzCrWLm+R7r7b044tUJD5eKm3eve4+u:NwvSFU/P9cCrWLm+RbbEeJD5jRW4+ |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2006:12:09 04:26:53+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 7.1 |
| CodeSize: | 167936 |
| InitializedDataSize: | 245760 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x22b93 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 856 | C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding | C:\Windows\System32\rundll32.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows host process (Rundll32) Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2200 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5284 | "C:\Users\admin\AppData\Local\Temp\zbmqv.exe" "-" | C:\Users\admin\AppData\Local\Temp\zbmqv.exe | 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 5764 | "C:\Users\admin\AppData\Local\Temp\033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe" | C:\Users\admin\AppData\Local\Temp\033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 6180 | "C:\Users\admin\AppData\Local\Temp\zbmqv.exe" "-" | C:\Users\admin\AppData\Local\Temp\zbmqv.exe | 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 6256 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6808 | "C:\Users\admin\AppData\Local\Temp\033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe" | C:\Users\admin\AppData\Local\Temp\033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | oxpamxnuiicm |
Value: droevlgslqpexoaui.exe | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | nxqcpbsapqlwl |
Value: wjfukztewaymeufy.exe . | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run |
| Operation: | write | Name: | oztguhziyawiym |
Value: kbbuohfuqyasoixulohg.exe | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | rdymbpisjmjwncm |
Value: kbbuohfuqyasoixulohg.exe | |||
| (PID) Process: | (6256) ShellExperienceHost.exe | Key: | \REGISTRY\A\{896de43d-2335-4e7b-4763-367720dc097c}\LocalState |
| Operation: | write | Name: | PeekBadges |
Value: 5B005D000000C9F191C30AFFDB01 | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | wjfukztewaymeufy |
Value: kbbuohfuqyasoixulohg.exe . | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | mbzqizviciiyskxshi |
Value: C:\Users\admin\AppData\Local\Temp\wjfukztewaymeufy.exe | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | oxpamxnuiicm |
Value: C:\Users\admin\AppData\Local\Temp\wjfukztewaymeufy.exe | |||
| (PID) Process: | (6808) 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | nxqcpbsapqlwl |
Value: C:\Users\admin\AppData\Local\Temp\zrsmhbaqnwzspkayquooa.exe . | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5284 | zbmqv.exe | C:\Users\admin\AppData\Local\edlmopvswmwwaczedopwpzno.zhi | binary | |
MD5:791318F6D080EE2BBF7049B6399ABA84 | SHA256:97BF604DB94416E5A8F191BDA433AC59F36ABB134F1FE955E8EFEB106F2FFF0A | |||
| 6808 | 033290def4dac191cd70106fdf60c5d1d95d79b389bb699e1f66443c9b605242.exe.patched.exe | C:\Users\admin\AppData\Local\Temp\zbmqv.exe | executable | |
MD5:AD6F2E6F62118EE7AC7452681B98CBF2 | SHA256:BF2CEFDB18231CC25C0FDEC5FA0B966B9EDFA51B9AE4A0D056B6014975864E47 | |||
| 5284 | zbmqv.exe | C:\Users\admin\AppData\Local\Temp\edlmopvswmwwaczedopwpzno.zhi | binary | |
MD5:791318F6D080EE2BBF7049B6399ABA84 | SHA256:97BF604DB94416E5A8F191BDA433AC59F36ABB134F1FE955E8EFEB106F2FFF0A | |||
| 5284 | zbmqv.exe | C:\Users\admin\AppData\Local\Temp\nxqcpbsapqlwlygwgcogkfeqnxqcpbsapql.lyg | binary | |
MD5:5E151952CD707353AF5BD3E3736F83E4 | SHA256:1CA4B6249397F25EF9F0DF661CFA807CEE3836F478D6AAE7CD3DC58D51F5A57E | |||
| 5284 | zbmqv.exe | C:\Program Files (x86)\edlmopvswmwwaczedopwpzno.zhi | binary | |
MD5:791318F6D080EE2BBF7049B6399ABA84 | SHA256:97BF604DB94416E5A8F191BDA433AC59F36ABB134F1FE955E8EFEB106F2FFF0A | |||
| 5284 | zbmqv.exe | C:\Program Files (x86)\nxqcpbsapqlwlygwgcogkfeqnxqcpbsapql.lyg | binary | |
MD5:5E151952CD707353AF5BD3E3736F83E4 | SHA256:1CA4B6249397F25EF9F0DF661CFA807CEE3836F478D6AAE7CD3DC58D51F5A57E | |||
| 5284 | zbmqv.exe | C:\Windows\nxqcpbsapqlwlygwgcogkfeqnxqcpbsapql.lyg | binary | |
MD5:5E151952CD707353AF5BD3E3736F83E4 | SHA256:1CA4B6249397F25EF9F0DF661CFA807CEE3836F478D6AAE7CD3DC58D51F5A57E | |||
| 5284 | zbmqv.exe | C:\Users\admin\AppData\Local\nxqcpbsapqlwlygwgcogkfeqnxqcpbsapql.lyg | binary | |
MD5:5E151952CD707353AF5BD3E3736F83E4 | SHA256:1CA4B6249397F25EF9F0DF661CFA807CEE3836F478D6AAE7CD3DC58D51F5A57E | |||
| 5284 | zbmqv.exe | C:\Windows\SysWOW64\nxqcpbsapqlwlygwgcogkfeqnxqcpbsapql.lyg | binary | |
MD5:5E151952CD707353AF5BD3E3736F83E4 | SHA256:1CA4B6249397F25EF9F0DF661CFA807CEE3836F478D6AAE7CD3DC58D51F5A57E | |||
| 5284 | zbmqv.exe | C:\Windows\SysWOW64\edlmopvswmwwaczedopwpzno.zhi | binary | |
MD5:791318F6D080EE2BBF7049B6399ABA84 | SHA256:97BF604DB94416E5A8F191BDA433AC59F36ABB134F1FE955E8EFEB106F2FFF0A | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5284 | zbmqv.exe | GET | 301 | 104.26.13.23:80 | http://www.whatismyip.com/ | unknown | — | — | malicious |
5284 | zbmqv.exe | GET | 403 | 104.19.222.79:80 | http://whatismyipaddress.com/ | unknown | — | — | whitelisted |
3704 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5284 | zbmqv.exe | GET | 403 | 104.19.222.79:80 | http://whatismyipaddress.com/ | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.216.77.20:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 69.192.161.161:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5284 | zbmqv.exe | GET | 301 | 188.114.96.3:80 | http://www.showmyipaddress.com/ | unknown | — | — | malicious |
5284 | zbmqv.exe | GET | 301 | 188.114.96.3:80 | http://www.showmyipaddress.com/ | unknown | — | — | malicious |
5284 | zbmqv.exe | GET | 403 | 104.19.222.79:80 | http://whatismyipaddress.com/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1268 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3584 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5284 | zbmqv.exe | 104.26.13.23:80 | www.whatismyip.com | CLOUDFLARENET | US | shared |
3704 | svchost.exe | 20.190.159.128:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5284 | zbmqv.exe | 104.19.222.79:80 | whatismyipaddress.com | CLOUDFLARENET | — | whitelisted |
3704 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 23.216.77.20:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.whatismyip.com |
| shared |
login.live.com |
| whitelisted |
whatismyipaddress.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.showmyipaddress.com |
| malicious |
whatismyip.everdot.org |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
5284 | zbmqv.exe | Attempted Information Leak | ET INFO IP Check Domain (whatismyip in HTTP Host) |
5284 | zbmqv.exe | A Network Trojan was detected | ET MALWARE Win32/Pykspa.C Public IP Check |
2200 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (whatismyipaddress .com) |
5284 | zbmqv.exe | A Network Trojan was detected | ET MALWARE Win32/Pykspa.C Public IP Check |
5284 | zbmqv.exe | A Network Trojan was detected | ET MALWARE Win32/Pykspa.C Public IP Check |
5284 | zbmqv.exe | Potential Corporate Privacy Violation | ET INFO IP Check Domain (showmyipaddress .com in HTTP Host) |
5284 | zbmqv.exe | A Network Trojan was detected | ET MALWARE Win32/Pykspa.C Public IP Check |
5284 | zbmqv.exe | A Network Trojan was detected | ET MALWARE Win32/Pykspa.C Public IP Check |
5284 | zbmqv.exe | Potential Corporate Privacy Violation | ET INFO IP Check Domain (showmyipaddress .com in HTTP Host) |
5284 | zbmqv.exe | A Network Trojan was detected | ET MALWARE Win32/Pykspa.C Public IP Check |