Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1453785
MD5:7dc8189f70cc34e18ea7af8fdeac4142
SHA1:8cb698efdf5971e0805dd0f0fb0457315490c777
SHA256:a3608a51db9df14c42f8c6e37ac49969de70b4be0862d82b5823c00aed395f9d
Tags:exe
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Searches for specific processes (likely to inject)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6360 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 7DC8189F70CC34E18EA7AF8FDEAC4142)
    • RegAsm.exe (PID: 2780 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199698764354", "https://t.me/r8z0l"], "Botnet": "8bd2ac5f1dd228859ac690a79c0bde71"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
      • 0x231f0:$s1: JohnDoe
      • 0x231e8:$s2: HAL9TH
      Process Memory Space: file.exe PID: 6360JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        Process Memory Space: file.exe PID: 6360JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            2.2.RegAsm.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
            • 0x231f0:$s1: JohnDoe
            • 0x231e8:$s2: HAL9TH
            2.2.RegAsm.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              2.2.RegAsm.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
              • 0x225f0:$s1: JohnDoe
              • 0x225e8:$s2: HAL9TH
              0.2.file.exe.ff0000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://116.202.190.18:5432/softokn3.dllPAvira URL Cloud: Label: malware
                Source: https://116.202.190.18/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/msvcp140.dlldgeAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllIQ=EAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dllZAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/freebl3.dllEdgeAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/sqls.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/freebl3.dllaAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/reebl3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/mozglue.dllEdgeAvira URL Cloud: Label: malware
                Source: https://t.me/r8z0lAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/freebl3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dll9Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/nss3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/mozglue.dllsAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllserAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dll/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/sqls.dllxAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/.190.18:5432/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/oftAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/MyAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/nss3.dllOAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/mozglue.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dllOMhAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/nss3.dllftAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/msvcp140.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllUserAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/ngAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dlldgeAvira URL Cloud: Label: malware
                Source: https://steamcommunity.com/profiles/76561199698764354Avira URL Cloud: Label: malware
                Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199698764354", "https://t.me/r8z0l"], "Botnet": "8bd2ac5f1dd228859ac690a79c0bde71"}
                Source: file.exeReversingLabs: Detection: 26%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406DE2 CryptUnprotectData,LocalAlloc,LocalFree,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040245C memset,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411B94 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406D7F CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00408E1E memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.dr
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100D5B1 FindFirstFileExW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D2FF _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C0F8 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401162 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A17A _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00417295 _EH_prolog,GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlenA,lstrlenA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A595 _EH_prolog,StrCmpCA,FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B616 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004176DE _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416824 _EH_prolog,wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,memset,lstrcat,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040AC07 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416EF1 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416C71 _EH_prolog,GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrcpy,lstrcpy,lstrcpy,lstrlenA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\

                Networking

                barindex
                Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199698764354
                Source: Malware configuration extractorURLs: https://t.me/r8z0l
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 116.202.190.18:5432
                Source: global trafficHTTP traffic detected: GET /r8z0l HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004041B2 _EH_prolog,GetProcessHeap,RtlAllocateHeap,InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,HttpSendRequestA,HttpQueryInfoA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,
                Source: global trafficHTTP traffic detected: GET /r8z0l HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: t.me
                Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                Source: file.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: file.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: file.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: file.exeString found in binary or memory: http://ocsp.entrust.net02
                Source: file.exeString found in binary or memory: http://ocsp.entrust.net03
                Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: file.exeString found in binary or memory: http://www.entrust.net/rpa03
                Source: RegAsm.exe, 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, sqls[1].dll.2.drString found in binary or memory: http://www.sqlite.org/copyright.html.
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18/
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/.190.18:5432/
                Source: RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/My
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/freebl3.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/freebl3.dllEdge
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/freebl3.dlla
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/mozglue.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/mozglue.dllEdge
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/mozglue.dlls
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/msvcp140.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/msvcp140.dlldge
                Source: RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/ng
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/nss3.dll
                Source: RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/nss3.dllO
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/nss3.dllft
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/oft
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/reebl3.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dll
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dllOMh
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dllP
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dllZ
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dlldge
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/sqls.dll
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/sqls.dllx
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001268000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dll
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dll/
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dll9
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dllIQ=E
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dllUser
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dllser
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432A
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432AMicrosoft
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432Content-Disposition:
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432c84cgle
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432fold
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432ing
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432l
                Source: FBKECF.2.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: FBKECF.2.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: FBKECF.2.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: FBKECF.2.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: FBKECF.2.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: FBKECF.2.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: FBKECF.2.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: file.exe, 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199698764354
                Source: RegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/i
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/r8z0l
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/r8z0lF
                Source: RegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/w
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
                Source: FBKECF.2.drString found in binary or memory: https://www.ecosia.org/newtab/
                Source: file.exeString found in binary or memory: https://www.entrust.net/rpa0
                Source: FBKECF.2.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004120E5 _EH_prolog,memset,GetDesktopWindow,GetWindowRect,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GlobalFix,GlobalSize,SelectObject,DeleteObject,DeleteObject,ReleaseDC,CloseWindow,

                System Summary

                barindex
                Source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010080C2
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01003530
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01011583
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01000454
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100C81A
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100FBE5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D079
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041E1F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D5CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B694CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A9A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B682018
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B735940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B681C9E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B682AA9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6812A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B1C50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7E9CC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68292D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B683580
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7153B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B85D209
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A5040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B699000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B73D6D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B729690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7E9430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68D4C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B784A60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68C800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B681EF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6BCE10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A8D2A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B683AB2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B708120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A8030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B700090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A8763
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6E4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B718760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A8680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7C0480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6ABAB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68251D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B7810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68290A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B3370
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68F160
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68174E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68AA40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B77A940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B79A900
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7669C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68481D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7BE800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B683E3B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B85AEBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6E2EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6C6E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6819DD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68209F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B70A0B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6966C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6AA560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B77A590
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6847AF
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00FFA750 appears 52 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B683AF3 appears 37 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B68395E appears 81 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B681F5A appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B8606B1 appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004195FA appears 112 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004024D7 appears 312 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B68415B appears 173 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B681C2B appears 47 times
                Source: file.exeStatic PE information: invalid certificate
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/11@2/2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004110AB _EH_prolog,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004114AC _EH_prolog,CoCreateInstance,SysAllocString,_wtoi64,SysFreeString,SysFreeString,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\60JGYAOC.htmJump to behavior
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
                Source: IDAEHC.2.dr, HJJKFB.2.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                Source: file.exeReversingLabs: Detection: 26%
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dll
                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptnet.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cabinet.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.dr
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418AFD GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                Source: sqls[1].dll.2.drStatic PE information: section name: .00cfg
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA00C push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A725 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B681BF9 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6810C8 push ecx; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418AFD GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: RegAsm.exeBinary or memory string: DIR_WATCH.DLL
                Source: RegAsm.exeBinary or memory string: SBIEDLL.DLL
                Source: RegAsm.exeBinary or memory string: API_LOG.DLL
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: AHAL9THJOHNDOEAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dllJump to dropped file
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410ACD GetKeyboardLayoutList followed by cmp: cmp eax, ebx and CTI: jbe 00410BE0h
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100D5B1 FindFirstFileExW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D2FF _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C0F8 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401162 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A17A _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00417295 _EH_prolog,GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlenA,lstrlenA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A595 _EH_prolog,StrCmpCA,FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B616 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004176DE _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416824 _EH_prolog,wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,memset,lstrcat,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040AC07 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416EF1 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416C71 _EH_prolog,GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrcpy,lstrcpy,lstrcpy,lstrlenA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410C69 GetSystemInfo,wsprintfA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
                Source: JEHIID.2.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: JEHIID.2.drBinary or memory string: discord.comVMware20,11696428655f
                Source: JEHIID.2.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: global block list test formVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011B4000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: JEHIID.2.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: JEHIID.2.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: JEHIID.2.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: JEHIID.2.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: JEHIID.2.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: JEHIID.2.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: JEHIID.2.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: JEHIID.2.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: JEHIID.2.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: JEHIID.2.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: JEHIID.2.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: RegAsm.exe, 00000002.00000002.3326127639.00000000010A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: JEHIID.2.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWA
                Source: JEHIID.2.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: JEHIID.2.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFE423 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418AFD GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100C44B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010049AA mov ecx, dword ptr fs:[00000030h]
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01010CFB GetProcessHeap,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFE423 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA52A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA686 SetUnhandledExceptionFilter,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA7C3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A8CF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F988 SetUnhandledExceptionFilter,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041BDF7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6842AF SetUnhandledExceptionFilter,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B682C8E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6360, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FC018D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411FA6 _EH_prolog,CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42F000
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 642000
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: DDC008
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA215 cpuid
                Source: C:\Users\user\Desktop\file.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _EH_prolog,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA424 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004109B3 GetProcessHeap,HeapAlloc,GetUserNameA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410A7A GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001268000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6360, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6360, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FDB10 sqlite3_initialize,sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B725910 sqlite3_mprintf,sqlite3_bind_int64,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7AD9E0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B701FE0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FDFC0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_mprintf,sqlite3_bind_text,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B695C70 sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B73D3B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7251D0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B719090 sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_errmsg,sqlite3_mprintf,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B75D610 sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7255B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7AD4F0 sqlite3_bind_value,sqlite3_log,sqlite3_log,sqlite3_log,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A14D0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B8970 sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_zeroblob,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B694820 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_initialize,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B0FB0 sqlite3_result_int64,sqlite3_result_double,sqlite3_result_int,sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B764D40 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B8CB0 sqlite3_bind_zeroblob,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6F8200 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B764140 sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_initialize,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6D06E0 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A8680 sqlite3_mprintf,sqlite3_mprintf,sqlite3_initialize,sqlite3_finalize,sqlite3_free,sqlite3_mprintf,sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_int64,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6D8550 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B8430 sqlite3_bind_int64,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B7810 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B743770 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7637E0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6AB400 sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,sqlite3_reset,sqlite3_step,sqlite3_reset,sqlite3_column_int64,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6DEF30 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6EE200 sqlite3_initialize,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FE170 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6EE090 sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FA6F0 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6966C0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_bind_value,sqlite3_free,sqlite3_bind_value,sqlite3_step,sqlite3_reset,
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                511
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                511
                Process Injection
                LSASS Memory141
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Deobfuscate/Decode Files or Information
                Security Account Manager12
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                Obfuscated Files or Information
                NTDS1
                Account Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                System Owner/User Discovery
                SSHKeylogging13
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync54
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe26%ReversingLabsWin32.Infostealer.Generic
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dll0%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                https://116.202.190.18:5432l0%Avira URL Cloudsafe
                https://116.202.190.18:5432/softokn3.dllP100%Avira URL Cloudmalware
                https://116.202.190.18/100%Avira URL Cloudmalware
                https://116.202.190.18:5432/softokn3.dll100%Avira URL Cloudmalware
                http://ocsp.entrust.net020%Avira URL Cloudsafe
                http://ocsp.entrust.net030%Avira URL Cloudsafe
                https://116.202.190.18:5432/msvcp140.dlldge100%Avira URL Cloudmalware
                https://web.telegram.org0%Avira URL Cloudsafe
                https://116.202.190.18:5432/vcruntime140.dllIQ=E100%Avira URL Cloudmalware
                https://116.202.190.18:5432/softokn3.dllZ100%Avira URL Cloudmalware
                https://116.202.190.18:5432Content-Disposition:0%Avira URL Cloudsafe
                https://116.202.190.18:5432/freebl3.dllEdge100%Avira URL Cloudmalware
                https://116.202.190.18:5432/sqls.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/freebl3.dlla100%Avira URL Cloudmalware
                https://116.202.190.18:5432/reebl3.dll100%Avira URL Cloudmalware
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%Avira URL Cloudsafe
                https://116.202.190.18:5432/mozglue.dllEdge100%Avira URL Cloudmalware
                https://t.me/r8z0l100%Avira URL Cloudmalware
                https://116.202.190.18:5432/freebl3.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/vcruntime140.dll9100%Avira URL Cloudmalware
                https://116.202.190.18:5432/nss3.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/mozglue.dlls100%Avira URL Cloudmalware
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%Avira URL Cloudsafe
                https://116.202.190.18:5432/vcruntime140.dllser100%Avira URL Cloudmalware
                http://crl.entrust.net/ts1ca.crl00%Avira URL Cloudsafe
                https://t.me/i0%Avira URL Cloudsafe
                https://116.202.190.18:5432/vcruntime140.dll/100%Avira URL Cloudmalware
                https://116.202.190.18:5432/sqls.dllx100%Avira URL Cloudmalware
                https://116.202.190.18:5432/vcruntime140.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432100%Avira URL Cloudmalware
                https://116.202.190.18:5432/100%Avira URL Cloudmalware
                http://www.sqlite.org/copyright.html.0%Avira URL Cloudsafe
                https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                https://116.202.190.18:5432fold0%Avira URL Cloudsafe
                https://116.202.190.18:5432/.190.18:5432/100%Avira URL Cloudmalware
                https://t.me/w0%Avira URL Cloudsafe
                https://116.202.190.18:5432/oft100%Avira URL Cloudmalware
                http://www.entrust.net/rpa030%Avira URL Cloudsafe
                https://116.202.190.18:5432/My100%Avira URL Cloudmalware
                https://116.202.190.18:5432/nss3.dllO100%Avira URL Cloudmalware
                https://116.202.190.18:5432/mozglue.dll100%Avira URL Cloudmalware
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                https://116.202.190.18:5432/softokn3.dllOMh100%Avira URL Cloudmalware
                http://aia.entrust.net/ts1-chain256.cer010%Avira URL Cloudsafe
                https://116.202.190.18:5432A0%Avira URL Cloudsafe
                https://www.ecosia.org/newtab/0%Avira URL Cloudsafe
                https://116.202.190.18:5432ing0%Avira URL Cloudsafe
                https://116.202.190.18:5432/nss3.dllft100%Avira URL Cloudmalware
                https://116.202.190.18:5432/msvcp140.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/vcruntime140.dllUser100%Avira URL Cloudmalware
                https://ac.ecosia.org/autocomplete?q=0%Avira URL Cloudsafe
                https://116.202.190.18:5432/ng100%Avira URL Cloudmalware
                https://116.202.190.18:5432/softokn3.dlldge100%Avira URL Cloudmalware
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%Avira URL Cloudsafe
                https://steamcommunity.com/profiles/76561199698764354100%Avira URL Cloudmalware
                https://www.entrust.net/rpa00%Avira URL Cloudsafe
                http://crl.entrust.net/2048ca.crl00%Avira URL Cloudsafe
                https://t.me/r8z0lF0%Avira URL Cloudsafe
                https://116.202.190.18:5432AMicrosoft0%Avira URL Cloudsafe
                https://116.202.190.18:5432c84cgle0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                t.me
                149.154.167.99
                truetrue
                  unknown
                  198.187.3.20.in-addr.arpa
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://t.me/r8z0ltrue
                    • Avira URL Cloud: malware
                    unknown
                    https://steamcommunity.com/profiles/76561199698764354true
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://116.202.190.18/RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://duckduckgo.com/chrome_newtabFBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/softokn3.dllPRegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://duckduckgo.com/ac/?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432lRegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://web.telegram.orgRegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/msvcp140.dlldgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://ocsp.entrust.net03file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.entrust.net02file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/softokn3.dllRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllIQ=ERegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/freebl3.dllEdgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/freebl3.dllaRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432Content-Disposition:RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/sqls.dllRegAsm.exe, 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/reebl3.dllRegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/softokn3.dllZRegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/mozglue.dllEdgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/freebl3.dllRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dll9RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/mozglue.dllsRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/nss3.dllRegAsm.exe, 00000002.00000002.3326265923.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchFBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dll/RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllserRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://t.me/iRegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.entrust.net/ts1ca.crl0file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/sqls.dllxRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllRegAsm.exe, 00000002.00000002.3326524144.0000000001268000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://www.sqlite.org/copyright.html.RegAsm.exe, 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, sqls[1].dll.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432foldRegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/.190.18:5432/RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoFBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://t.me/wRegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/oftRegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://www.entrust.net/rpa03file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/nss3.dllORegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/MyRegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/softokn3.dllOMhRegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/mozglue.dllRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://aia.entrust.net/ts1-chain256.cer01file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432ARegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432ingRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/msvcp140.dllRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/nss3.dllftRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllUserRegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://ac.ecosia.org/autocomplete?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/ngRegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/softokn3.dlldgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://t.me/r8z0lFRegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.entrust.net/2048ca.crl0file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.entrust.net/rpa0file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432AMicrosoftRegAsm.exe, 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432c84cgleRegAsm.exe, 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    116.202.190.18
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    149.154.167.99
                    t.meUnited Kingdom
                    62041TELEGRAMRUtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1453785
                    Start date and time:2024-06-07 17:20:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 3s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/11@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • TCP Packets have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 93.184.221.240
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    11:21:13API Interceptor1x Sleep call for process: RegAsm.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                    Category:dropped
                    Size (bytes):155648
                    Entropy (8bit):0.5407252242845243
                    Encrypted:false
                    SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                    MD5:7B955D976803304F2C0505431A0CF1CF
                    SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                    SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                    SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                    Category:dropped
                    Size (bytes):159744
                    Entropy (8bit):0.5394293526345721
                    Encrypted:false
                    SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                    MD5:52701A76A821CDDBC23FB25C3FCA4968
                    SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                    SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                    SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                    Category:dropped
                    Size (bytes):20480
                    Entropy (8bit):0.8439810553697228
                    Encrypted:false
                    SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                    MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                    SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                    SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                    SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                    Category:dropped
                    Size (bytes):20480
                    Entropy (8bit):0.6732424250451717
                    Encrypted:false
                    SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                    MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                    SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                    SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                    SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                    Category:dropped
                    Size (bytes):106496
                    Entropy (8bit):1.136413900497188
                    Encrypted:false
                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                    MD5:429F49156428FD53EB06FC82088FD324
                    SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                    SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                    SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                    Category:dropped
                    Size (bytes):40960
                    Entropy (8bit):0.8553638852307782
                    Encrypted:false
                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                    MD5:28222628A3465C5F0D4B28F70F97F482
                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                    Malicious:false
                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                    Category:dropped
                    Size (bytes):51200
                    Entropy (8bit):0.8746135976761988
                    Encrypted:false
                    SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                    MD5:9E68EA772705B5EC0C83C2A97BB26324
                    SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                    SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                    SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                    Malicious:false
                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                    Category:modified
                    Size (bytes):196608
                    Entropy (8bit):1.121297215059106
                    Encrypted:false
                    SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                    MD5:D87270D0039ED3A5A72E7082EA71E305
                    SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                    SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                    SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                    Malicious:false
                    Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                    Category:dropped
                    Size (bytes):71954
                    Entropy (8bit):7.996617769952133
                    Encrypted:true
                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                    Malicious:false
                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):328
                    Entropy (8bit):3.137989037915285
                    Encrypted:false
                    SSDEEP:6:kKPGT9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:2qDnLNkPlE99SNxAhUe/3
                    MD5:E113C02773BE81D3C280B225C06A3655
                    SHA1:F01C16E165703E9F97C726AECF2CE956CAB2C3D9
                    SHA-256:5D7D8A8AE4AFA4CC5872303C20186CC1DF574E75A323D9DD2AC9A6AD47AED049
                    SHA-512:EDAD37963070E6E6BA6DF20075FB4DF28411911D4CAB10834DEA1A33DF7B8AAC5D8E3909323E97377D8CB1F04095476CC7675B73052C4C1CD4F0DC8A9F870440
                    Malicious:false
                    Preview:p...... ........V\VQ...(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):2459136
                    Entropy (8bit):6.052474106868353
                    Encrypted:false
                    SSDEEP:49152:WHoJ9zGioiMjW2RrL9B8SSpiCH7cuez9A:WHoJBGqabRnj8JY/9
                    MD5:90E744829865D57082A7F452EDC90DE5
                    SHA1:833B178775F39675FA4E55EAB1032353514E1052
                    SHA-256:036A57102385D7F0D7B2DEACF932C1C372AE30D924365B7A88F8A26657DD7550
                    SHA-512:0A2D112FF7CB806A74F5EC17FE097D28107BB497D6ED5AD28EA47E6795434BA903CDB49AAF97A9A99C08CD0411F1969CAD93031246DC107C26606A898E570323
                    Malicious:false
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 0%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7.Z.Y.Z.Y.Z.Y...Z.n.Y...\..Y...]...Y...X.Y.Y.Z.X..Y.O.\.E.Y.O.].U.Y.O.Z.L.Y.l3].[.Y.l3Y.[.Y.l3..[.Y.l3[.[.Y.RichZ.Y.................PE..L...i.`e...........!...%.. .........{D........ ...............................%...........@...........................#..6....$.(.....$.......................$.....`.#.8...........................x.#.@.............$..............................text...G. ....... ................. ..`.rdata...".... ..$.... .............@..@.data...4|... $..b....#.............@....idata........$......^$.............@..@.00cfg........$......p$.............@..@.rsrc.........$......r$.............@..@.reloc..5.....$.......$.............@..B................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.504017216084228
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:442'408 bytes
                    MD5:7dc8189f70cc34e18ea7af8fdeac4142
                    SHA1:8cb698efdf5971e0805dd0f0fb0457315490c777
                    SHA256:a3608a51db9df14c42f8c6e37ac49969de70b4be0862d82b5823c00aed395f9d
                    SHA512:9bb17829724af371d383874b8ed4efe09f7f518fa131d68dd02ae0a149b0506f42b2694d7ec9a59b591b28fdcd620b68116e1170cd489b396d294126332e93ac
                    SSDEEP:6144:+uvXVvZjkQbsWSHZhP2YQih4Qsc14gY8f4en6hZpG+es7SJnXZfGBTaDsj48bR4B:5vdkQbjcps2+8uhAs64TR47EO
                    TLSH:9894E01275C08473EA6325324AF4D7B96A7DFC300EB2498FA3A51BBE4F342829721757
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............T...T...T[..U...T[..U#..T[..U...TJi.U...T[..U...T...T...TJi.U...TJi.U...T{j.U...T{j.T...T{j.U...TRich...T...............
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x409caa
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66630B74 [Fri Jun 7 13:30:28 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:c746ee5ba8a06ab7dd2d5d1c7f055c1e
                    Signature Valid:false
                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                    Signature Validation Error:The digital signature of the object did not verify
                    Error Number:-2146869232
                    Not Before, Not After
                    • 13/01/2023 01:00:00 17/01/2026 00:59:59
                    Subject Chain
                    • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                    Version:3
                    Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                    Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                    Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                    Serial:0997C56CAA59055394D9A9CDB8BEEB56
                    Instruction
                    call 00007F11211BEA47h
                    jmp 00007F11211BE0F9h
                    push ebp
                    mov ebp, esp
                    jmp 00007F11211BE28Fh
                    push dword ptr [ebp+08h]
                    call 00007F11211CA864h
                    pop ecx
                    test eax, eax
                    je 00007F11211BE291h
                    push dword ptr [ebp+08h]
                    call 00007F11211C54F9h
                    pop ecx
                    test eax, eax
                    je 00007F11211BE268h
                    pop ebp
                    ret
                    cmp dword ptr [ebp+08h], FFFFFFFFh
                    je 00007F11211B8AD2h
                    jmp 00007F11211BED36h
                    push ebp
                    mov ebp, esp
                    push dword ptr [ebp+08h]
                    call 00007F11211BED48h
                    pop ecx
                    pop ebp
                    ret
                    jmp 00007F11211BED40h
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [ebp+08h]
                    push esi
                    mov ecx, dword ptr [eax+3Ch]
                    add ecx, eax
                    movzx eax, word ptr [ecx+14h]
                    lea edx, dword ptr [ecx+18h]
                    add edx, eax
                    movzx eax, word ptr [ecx+06h]
                    imul esi, eax, 28h
                    add esi, edx
                    cmp edx, esi
                    je 00007F11211BE29Bh
                    mov ecx, dword ptr [ebp+0Ch]
                    cmp ecx, dword ptr [edx+0Ch]
                    jc 00007F11211BE28Ch
                    mov eax, dword ptr [edx+08h]
                    add eax, dword ptr [edx+0Ch]
                    cmp ecx, eax
                    jc 00007F11211BE28Eh
                    add edx, 28h
                    cmp edx, esi
                    jne 00007F11211BE26Ch
                    xor eax, eax
                    pop esi
                    pop ebp
                    ret
                    mov eax, edx
                    jmp 00007F11211BE27Bh
                    push esi
                    call 00007F11211BECFBh
                    test eax, eax
                    je 00007F11211BE2A2h
                    mov eax, dword ptr fs:[00000018h]
                    mov esi, 004693ACh
                    mov edx, dword ptr [eax+04h]
                    jmp 00007F11211BE286h
                    cmp edx, eax
                    je 00007F11211BE292h
                    xor eax, eax
                    mov ecx, edx
                    lock cmpxchg dword ptr [esi], ecx
                    test eax, eax
                    jne 00007F11211BE272h
                    xor al, al
                    pop esi
                    ret
                    mov al, 01h
                    pop esi
                    ret
                    push ebp
                    mov ebp, esp
                    cmp dword ptr [ebp+00h], 00000000h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x31d640x3c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6a0000x1e0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x69a000x2628
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6b0000x221c.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x2f0780x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x2f0c00x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2efb80x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x270000x178.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x2595b0x25a00d03b1ac577e8310a65cfcca0d1b9b28cFalse0.5770543500830565data6.629946953103711IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x270000xb6380xb80083ce0a9da3b5383dcb7ae371d186047bFalse0.4192000679347826data4.874082709437768IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x330000x36ebc0x35e008c632b07301722aef05673ff6d2dbc3eFalse0.9738979118329466data7.979395809192078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x6a0000x1e00x200ec748486ad40c4e6cd2019b55b71ef97False0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x6b0000x221c0x2400f99ed12824f202033297dec3df069714False0.7098524305555556data6.4054305886337835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x6a0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                    DLLImport
                    ADVAPI32.dllRegEnableReflectionKey, DeleteAce
                    KERNEL32.dllWaitForSingleObjectEx, CreateThread, VirtualAlloc, GetModuleHandleA, GetProcAddress, RaiseException, InitOnceBeginInitialize, InitOnceComplete, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetCurrentThreadId, WakeAllConditionVariable, SleepConditionVariableSRW, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, CloseHandle, EncodePointer, DecodePointer, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetCPInfo, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, CreateFileW, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, HeapSize, WriteConsoleW
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 7, 2024 17:21:04.529378891 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:04.529469967 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:04.529561996 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:04.549695969 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:04.549732924 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.423832893 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.424055099 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.467292070 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.467319012 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.468219042 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.468286037 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.473617077 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.520513058 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.787926912 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.787965059 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.788023949 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.788059950 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.788080931 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.788081884 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.788081884 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.788178921 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.798670053 CEST49708443192.168.2.5149.154.167.99
                    Jun 7, 2024 17:21:05.798715115 CEST44349708149.154.167.99192.168.2.5
                    Jun 7, 2024 17:21:05.824611902 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:05.829792976 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:05.830240965 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:05.830362082 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:05.835469961 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:06.702445030 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:06.702464104 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:06.702553988 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:07.904989958 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:07.909918070 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:08.151453018 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:08.151582003 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:08.152216911 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:08.157123089 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:08.654932022 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:08.655482054 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:08.660881996 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:08.665803909 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:08.665992022 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:08.666332006 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:08.671190023 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:09.512254000 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:09.512331009 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:09.512737989 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:09.515331984 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:09.517590046 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:09.520246029 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.054327965 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.054414988 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.069391966 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.070051908 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.074610949 CEST543249709116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.074702024 CEST497095432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.075190067 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.075259924 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.075542927 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.080343008 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.923140049 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.923269033 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.923600912 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.925312042 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:10.928489923 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:10.930213928 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:11.455221891 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:11.455261946 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:11.455355883 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:11.457024097 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:11.457264900 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:11.462129116 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:11.462217093 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:11.462248087 CEST543249711116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:11.462414980 CEST497115432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:11.462449074 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:11.467353106 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.323450089 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.323539972 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.324070930 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.326373100 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.329113960 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.331222057 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866233110 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866247892 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866254091 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866333961 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866343975 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866353035 CEST543249713116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.866370916 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.866432905 CEST497135432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.868168116 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.868549109 CEST497145432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.873472929 CEST543249714116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.873521090 CEST543249712116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:12.873583078 CEST497145432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.873646021 CEST497125432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.873819113 CEST497145432192.168.2.5116.202.190.18
                    Jun 7, 2024 17:21:12.878635883 CEST543249714116.202.190.18192.168.2.5
                    Jun 7, 2024 17:21:13.718590021 CEST543249714116.202.190.18192.168.2.5
                    TimestampSource PortDest PortSource IPDest IP
                    Jun 7, 2024 17:21:04.512676954 CEST5891353192.168.2.51.1.1.1
                    Jun 7, 2024 17:21:04.519785881 CEST53589131.1.1.1192.168.2.5
                    Jun 7, 2024 17:21:25.621989965 CEST53497951.1.1.1192.168.2.5
                    Jun 7, 2024 17:21:40.356259108 CEST5355550162.159.36.2192.168.2.5
                    Jun 7, 2024 17:21:40.977365971 CEST4990653192.168.2.51.1.1.1
                    Jun 7, 2024 17:21:40.985791922 CEST53499061.1.1.1192.168.2.5
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jun 7, 2024 17:21:04.512676954 CEST192.168.2.51.1.1.10x9fe0Standard query (0)t.meA (IP address)IN (0x0001)false
                    Jun 7, 2024 17:21:40.977365971 CEST192.168.2.51.1.1.10xb45fStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jun 7, 2024 17:21:04.519785881 CEST1.1.1.1192.168.2.50x9fe0No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                    Jun 7, 2024 17:21:40.985791922 CEST1.1.1.1192.168.2.50xb45fName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                    • t.me

                    Click to jump to process

                    Target ID:0
                    Start time:11:21:02
                    Start date:07/06/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0xff0000
                    File size:442'408 bytes
                    MD5 hash:7DC8189F70CC34E18EA7AF8FDEAC4142
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:11:21:03
                    Start date:07/06/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Imagebase:0xa90000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation, Description: Detects executables containing potential Windows Defender anti-emulation checks, Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:high
                    Has exited:false

                    No disassembly