Click to jump to signature section
Source: e5mIhMkcj5.exe | Virustotal: Detection: 19% | Perma Link |
Source: e5mIhMkcj5.exe | ReversingLabs: Detection: 23% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.9% probability |
Source: e5mIhMkcj5.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: e5mIhMkcj5.exe | Static PE information: certificate valid |
Source: e5mIhMkcj5.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: global traffic | HTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | TCP traffic detected without corresponding DNS query: 23.94.207.151 |
Source: unknown | HTTP traffic detected: POST /avs_pro/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencoded; Charset=UTF-8Accept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Content-Length: 135Host: 23.94.207.151 |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/ |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/& |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/M |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001979000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/avs_pro/index.phpic |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342666267.000000000199F000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342564771.000000000199D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://23.94.207.151/h |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0( |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.digicert.com0A |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.digicert.com0C |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.digicert.com0X |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: e5mIhMkcj5.exe | String found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0? |
Source: e5mIhMkcj5.exe | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: e5mIhMkcj5.exe | Static PE information: section name: .!Zx |
Source: e5mIhMkcj5.exe | Static PE information: section name: .]#m |
Source: e5mIhMkcj5.exe | Static PE information: section name: .2"V |
Source: e5mIhMkcj5.exe, 00000000.00000000.1692687442.0000000001214000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe |
Source: e5mIhMkcj5.exe | Binary or memory string: OriginalFilenamepythonw.exe. vs e5mIhMkcj5.exe |
Source: e5mIhMkcj5.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: classification engine | Classification label: mal64.evad.winEXE@1/0@0/1 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | File created: C:\Users\user\AppData\Roaming\987CE2CE | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Mutant created: \Sessions\1\BaseNamedObjects\987CE2CE2024 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: e5mIhMkcj5.exe | Virustotal: Detection: 19% |
Source: e5mIhMkcj5.exe | ReversingLabs: Detection: 23% |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: python313.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: magnification.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wtsapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: d3d9.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: security.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: olepro32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winhttpcom.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 | Jump to behavior |
Source: e5mIhMkcj5.exe | Static PE information: certificate valid |
Source: e5mIhMkcj5.exe | Static file information: File size 8816544 > 1048576 |
Source: e5mIhMkcj5.exe | Static PE information: Raw size of .2"V is bigger than: 0x100000 < 0x851e00 |
Source: e5mIhMkcj5.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: initial sample | Static PE information: section where entry point is pointing to: .2"V |
Source: e5mIhMkcj5.exe | Static PE information: section name: .!Zx |
Source: e5mIhMkcj5.exe | Static PE information: section name: .]#m |
Source: e5mIhMkcj5.exe | Static PE information: section name: .2"V |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1390005 value: E9 8B 2F B7 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02F90 value: E9 7A D0 48 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 13A0005 value: E9 5B 2E B6 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02E60 value: E9 AA D1 49 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 13B0005 value: E9 EB 3E B5 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F03EF0 value: E9 1A C1 4A 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 13C0005 value: E9 DB 2F B4 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02FE0 value: E9 2A D0 4B 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 13D0005 value: E9 BB 2D B3 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02DC0 value: E9 4A D2 4C 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 13E0005 value: E9 CB 2A B2 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02AD0 value: E9 3A D5 4D 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 13F0005 value: E9 7B 2B B1 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02B80 value: E9 8A D4 4E 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 18C0005 value: E9 1B 2F 64 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02F20 value: E9 EA D0 9B 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 18D0005 value: E9 FB 2C 63 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02D00 value: E9 0A D3 9C 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 18E0005 value: E9 DB 2D 62 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02DE0 value: E9 2A D2 9D 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 18F0005 value: E9 AB 3E 61 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F03EB0 value: E9 5A C1 9E 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1900005 value: E9 2B 2F 60 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02F30 value: E9 DA D0 9F 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1910005 value: E9 9B 2F 5F 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02FA0 value: E9 6A D0 A0 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D10005 value: E9 0B 2D 1F 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02D10 value: E9 FA D2 E0 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D20005 value: E9 CB 3B 1E 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F03BD0 value: E9 3A C4 E1 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D30005 value: E9 2B 2D 1D 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02D30 value: E9 DA D2 E2 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D40005 value: E9 4B 47 1C 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F04750 value: E9 BA B8 E3 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D50005 value: E9 BB 2C 1B 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02CC0 value: E9 4A D3 E4 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D60005 value: E9 8B 3B 1A 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F03B90 value: E9 7A C4 E5 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D80005 value: E9 5B 2B 18 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02B60 value: E9 AA D4 E7 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 1D90005 value: E9 6B 2B 17 75 | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Memory written: PID: 5480 base: 76F02B70 value: E9 9A D4 E8 8A | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1134A82 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 113C187 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 9CDC5E |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1150C0D |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 11CA09C |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: A77795 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 11474FB |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 114370D |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 11436D6 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 9FBC19 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 10F0021 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1175372 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1117553 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | API/Special instruction interceptor: Address: 1130063 |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe TID: 2308 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342584334.00000000019AF000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342534930.00000000019A6000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342703862.00000000019B0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWindows\System32\en-US\mswsock.dll.mui |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342723122.0000000001990000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001981000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAWx- |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342584334.00000000019AF000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342534930.00000000019A6000.00000004.00000020.00020000.00000000.sdmp, e5mIhMkcj5.exe, 00000000.00000003.2342703862.00000000019B0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001981000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe |
Source: e5mIhMkcj5.exe, 00000000.00000003.2342603897.0000000001981000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \Windows Defender\MsMpeng.exe |
Source: C:\Users\user\Desktop\e5mIhMkcj5.exe | WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct |