Click to jump to signature section
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: oAuym78xev.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: unknown | HTTPS traffic detected: 142.250.184.206:443 -> 192.168.2.9:49691 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 142.250.185.225:443 -> 192.168.2.9:49692 version: TLS 1.2 |
Source: oAuym78xev.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_00406404 FindFirstFileW,FindClose, | 0_2_00406404 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_004058B2 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_004058B2 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_0040287E FindFirstFileW, | 0_2_0040287E |
Source: Joe Sandbox View | JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19 |
Source: Network traffic | Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49691 -> 142.250.184.206:443 |
Source: global traffic | HTTP traffic detected: GET /uc?export=download&id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /download?id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /uc?export=download&id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache |
Source: global traffic | HTTP traffic detected: GET /download?id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive |
Source: global traffic | DNS traffic detected: DNS query: drive.google.com |
Source: global traffic | DNS traffic detected: DNS query: drive.usercontent.google.com |
Source: oAuym78xev.exe, 00000000.00000000.875776178.000000000040A000.00000008.00000001.01000000.00000003.sdmp, oAuym78xev.exe, 00000000.00000002.3118132739.000000000040A000.00000004.00000001.01000000.00000003.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://apis.google.com |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.0000000007278000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/ |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.0000000007278000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/uc?export=download&id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.0000000007278000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/uc?export=download&id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyOK |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.0000000007278000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.google.com/uc?export=download&id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyOS |
Source: oAuym78xev.exe, 0000000B.00000003.3319331401.00000000072E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/2 |
Source: oAuym78xev.exe, 0000000B.00000003.3319331401.00000000072E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/P |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000003.3319331401.00000000072E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO&export=download |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.0000000007278000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO&export=downloadi |
Source: oAuym78xev.exe, 0000000B.00000003.3319331401.00000000072E3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1-ToAtaHbRKlgQ3IAfMQsFD67yEamsGyO&export=downloadr |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ssl.gstatic.com |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google-analytics.com;report-uri |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.googletagmanager.com |
Source: oAuym78xev.exe, 0000000B.00000003.3252009975.0000000007321000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49692 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49691 |
Source: unknown | Network traffic detected: HTTP traffic on port 49692 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 49691 -> 443 |
Source: unknown | HTTPS traffic detected: 142.250.184.206:443 -> 192.168.2.9:49691 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 142.250.185.225:443 -> 192.168.2.9:49692 version: TLS 1.2 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_0040535F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_0040535F |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_00403311 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403311 |
Source: oAuym78xev.exe | Static PE information: invalid certificate |
Source: oAuym78xev.exe | Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
Source: classification engine | Classification label: mal80.troj.evad.winEXE@3/17@2/2 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_00403311 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403311 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_0040474E CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW, | 0_2_0040474E |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_0040216A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk, | 0_2_0040216A |
Source: oAuym78xev.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: oAuym78xev.exe | Virustotal: Detection: 71% |
Source: oAuym78xev.exe | ReversingLabs: Detection: 52% |
Source: unknown | Process created: C:\Users\user\Desktop\oAuym78xev.exe "C:\Users\user\Desktop\oAuym78xev.exe" | |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Process created: C:\Users\user\Desktop\oAuym78xev.exe "C:\Users\user\Desktop\oAuym78xev.exe" | |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Process created: C:\Users\user\Desktop\oAuym78xev.exe "C:\Users\user\Desktop\oAuym78xev.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: oAuym78xev.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Yara match | File source: 00000000.00000002.3119456623.00000000070CA000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW, | 0_2_10001B18 |
Source: Initial sample | Joe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer same as subject) which is not trusted by system. 2) Suspicious email domain 'Perigenital.Ung' appears non-corporate and potentially generated. 3) Organization 'Gearwheels' is not a known legitimate company. 4) Large time gap between compilation date (2016) and certificate dates (2024-2025) suggests certificate was likely created long after the binary. 5) The OU field contains strange concatenated words 'Lancashire Richter Tachygrapher' that appear randomly generated. 6) While the country (FR) is not inherently suspicious, the combination with other factors suggests this is likely a fake French entity. The overall pattern strongly indicates a malicious attempt to appear legitimate while using generated/fake certificate details. |
Source: C:\Users\user\Desktop\oAuym78xev.exe | File created: C:\Users\user\AppData\Local\Temp\nsb1264.tmp\LangDLL.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\oAuym78xev.exe | File created: C:\Users\user\AppData\Local\Temp\nsb1264.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\oAuym78xev.exe | API/Special instruction interceptor: Address: 73A89BD |
Source: C:\Users\user\Desktop\oAuym78xev.exe | API/Special instruction interceptor: Address: 42389BD |
Source: C:\Users\user\Desktop\oAuym78xev.exe | RDTSC instruction interceptor: First address: 7367C61 second address: 7367C61 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FDAE8722C08h 0x00000006 cmp ebx, ecx 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oAuym78xev.exe | RDTSC instruction interceptor: First address: 41F7C61 second address: 41F7C61 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FDAE8D50978h 0x00000006 cmp ebx, ecx 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsb1264.tmp\LangDLL.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsb1264.tmp\System.dll | Jump to dropped file |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_00406404 FindFirstFileW,FindClose, | 0_2_00406404 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_004058B2 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_004058B2 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_0040287E FindFirstFileW, | 0_2_0040287E |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW9m |
Source: oAuym78xev.exe, 0000000B.00000002.3349816236.0000000007278000.00000004.00000020.00020000.00000000.sdmp, oAuym78xev.exe, 0000000B.00000002.3349816236.00000000072CD000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Users\user\Desktop\oAuym78xev.exe | API call chain: ExitProcess graph end node | graph_0-4370 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | API call chain: ExitProcess graph end node | graph_0-4379 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_00401E43 LdrInitializeThunk,ShowWindow,EnableWindow, | 0_2_00401E43 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW, | 0_2_10001B18 |
Source: C:\Users\user\Desktop\oAuym78xev.exe | Code function: 0_2_00403311 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403311 |