Click to jump to signature section
Source: OTRykEzo6o.exe | ReversingLabs: Detection: 34% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 99.3% probability |
Source: OTRykEzo6o.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Code function: 0_2_00007FFD348B0FD9 NtQuerySystemInformation, | 0_2_00007FFD348B0FD9 |
Source: OTRykEzo6o.exe | Static PE information: No import functions for PE file found |
Source: OTRykEzo6o.exe, 00000000.00000000.2123630795.0000000000262000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamenew-uninstaller.exe4 vs OTRykEzo6o.exe |
Source: OTRykEzo6o.exe | Binary or memory string: OriginalFilenamenew-uninstaller.exe4 vs OTRykEzo6o.exe |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f |
Source: classification engine | Classification label: mal56.winEXE@8/1@0/0 |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\OTRykEzo6o.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6536:120:WilError_03 |
Source: OTRykEzo6o.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | File read: C:\Users\user\Desktop\desktop.ini | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: OTRykEzo6o.exe | ReversingLabs: Detection: 34% |
Source: unknown | Process created: C:\Users\user\Desktop\OTRykEzo6o.exe "C:\Users\user\Desktop\OTRykEzo6o.exe" | |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c sc delete "WinSvcs" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete "WinSvcs" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f | |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c sc delete "WinSvcs" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete "WinSvcs" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32 | Jump to behavior |
Source: OTRykEzo6o.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: OTRykEzo6o.exe | Static PE information: Image base 0x140000000 > 0x60000000 |
Source: OTRykEzo6o.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Code function: 0_2_00007FFD348B00BD pushad ; iretd | 0_2_00007FFD348B00C1 |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete "WinSvcs" |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Memory allocated: A90000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Memory allocated: 1B280000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe TID: 3428 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c sc delete "WinSvcs" & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\sc.exe sc delete "WinSvcs" | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\reg.exe reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WinSvcs" /f | Jump to behavior |
Source: C:\Users\user\Desktop\OTRykEzo6o.exe | Queries volume information: C:\Users\user\Desktop\OTRykEzo6o.exe VolumeInformation | Jump to behavior |