Click to jump to signature section
Source: e5mIhMkcj5.exe | Virustotal: Detection: 19% | Perma Link |
Source: e5mIhMkcj5.exe | ReversingLabs: Detection: 23% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.9% probability |
Source: e5mIhMkcj5.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: e5mIhMkcj5.exe | Static PE information: certificate valid |
Source: e5mIhMkcj5.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: global traffic | HTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | HTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151 |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001785000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/ |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/avs_pro/index.php |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/avs_pro/index.php% |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001785000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/avs_pro/index.php(o |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/avs_pro/index.phprontdesHQ# |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/c |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.00000000017BC000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988618176.00000000017BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/v |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0( |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.digicert.com0X |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: e5mIhMkcj5.exe | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: e5mIhMkcj5.exe | Static PE information: section name: .!Zx |
Source: e5mIhMkcj5.exe | Static PE information: section name: .]#m |
Source: e5mIhMkcj5.exe | Static PE information: section name: .2"V |
Source: e5mIhMkcj5.exe, 00000001.00000000.1324737978.0000000001144000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe |
Source: e5mIhMkcj5.exe | Binary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe |
Source: e5mIhMkcj5.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal64.evad.winEXE@1/0@0/1 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | File created: C:\Users\user\AppData\Roaming\A449BEDB | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Mutant created: \Sessions\1\BaseNamedObjects\A449BEDB2024 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: e5mIhMkcj5.exe | Virustotal: Detection: 19% |
Source: e5mIhMkcj5.exe | ReversingLabs: Detection: 23% |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: python313.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: magnification.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: security.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winhttpcom.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 | Jump to behavior |
Source: e5mIhMkcj5.exe | Static PE information: certificate valid |
Source: e5mIhMkcj5.exe | Static file information: File size 8816544 > 1048576 |
Source: e5mIhMkcj5.exe | Static PE information: Raw size of .2"V is bigger than: 0x100000 < 0x851e00 |
Source: e5mIhMkcj5.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: initial sample | Static PE information: section where entry point is pointing to: .2"V |
Source: e5mIhMkcj5.exe | Static PE information: section name: .!Zx |
Source: e5mIhMkcj5.exe | Static PE information: section name: .]#m |
Source: e5mIhMkcj5.exe | Static PE information: section name: .2"V |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1730005 value: E9 8B 2F 03 76 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762F90 value: E9 7A D0 FC 89 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1B70005 value: E9 5B 2E BF 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762E60 value: E9 AA D1 40 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1B90005 value: E9 EB 3E BD 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77763EF0 value: E9 1A C1 42 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1BA0005 value: E9 DB 2F BC 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762FE0 value: E9 2A D0 43 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1BB0005 value: E9 BB 2D BB 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762DC0 value: E9 4A D2 44 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1BD0005 value: E9 CB 2A B9 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762AD0 value: E9 3A D5 46 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1BE0005 value: E9 7B 2B B8 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762B80 value: E9 8A D4 47 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1BF0005 value: E9 1B 2F B7 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762F20 value: E9 EA D0 48 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C00005 value: E9 FB 2C B6 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762D00 value: E9 0A D3 49 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C10005 value: E9 DB 2D B5 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762DE0 value: E9 2A D2 4A 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C20005 value: E9 AB 3E B4 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77763EB0 value: E9 5A C1 4B 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C30005 value: E9 2B 2F B3 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762F30 value: E9 DA D0 4C 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C40005 value: E9 9B 2F B2 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762FA0 value: E9 6A D0 4D 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C50005 value: E9 0B 2D B1 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762D10 value: E9 FA D2 4E 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C60005 value: E9 CB 3B B0 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77763BD0 value: E9 3A C4 4F 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C70005 value: E9 2B 2D AF 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762D30 value: E9 DA D2 50 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C80005 value: E9 4B 47 AE 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77764750 value: E9 BA B8 51 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1C90005 value: E9 BB 2C AD 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762CC0 value: E9 4A D3 52 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1CA0005 value: E9 8B 3B AC 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77763B90 value: E9 7A C4 53 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1CB0005 value: E9 5B 2B AB 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762B60 value: E9 AA D4 54 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 1CC0005 value: E9 6B 2B AA 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 6596 base: 77762B70 value: E9 9A D4 55 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1130F09 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 97CB0A |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 90BB8B |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 932392 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 9A7795 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 91B4D3 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 8F2024 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 92BC19 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 107370D |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 10774FB |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 10B81E7 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1015495 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 9CE079 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 971FE0 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe TID: 5292 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe TID: 2520 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665341379.00000000017CB000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988671031.00000000017C7000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.000000000179F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988696834.00000000017CE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665341379.00000000017CB000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988671031.00000000017C7000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1988696834.00000000017CE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW` |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.000000000179F000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: les%\Windows Defender\MsMpeng.exe |
Source: e5mIhMkcj5.exe, 00000001.00000003.1665361684.000000000179F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000001.00000003.1665361684.0000000001795000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct |