Windows Analysis Report
1kBeqS7E3z.exe

Overview

General Information

Sample name: 1kBeqS7E3z.exe
renamed because original name is a hash value
Original sample name: 9f7d8785aa5e359848ebe4d771f3de8d.exe
Analysis ID: 1459871
MD5: 9f7d8785aa5e359848ebe4d771f3de8d
SHA1: 70161505853a4cb3b2dc7eb690bde8b0f23b4d82
SHA256: 9cf43d480f6319717934b1a3f97682a4454c1742e2409aa416ba719e606c34ca
Tags: 32exetrojan
Infos:

Detection

LummaC, RisePro Stealer, Vidar
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected RisePro Stealer
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Country aware sample found (crashes after keyboard check)
Creates multiple autostart registry keys
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Lumma Stealer, LummaC2 Stealer Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
Name Description Attribution Blogpost URLs Link
Vidar Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.vidar

AV Detection

barindex
Source: 1kBeqS7E3z.exe Avira: detected
Source: https://feighminoritsjda.shop/ Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/;P Avira URL Cloud: Label: malware
Source: https://t.me/memve4erin Avira URL Cloud: Label: malware
Source: http://5.42.65.116/rise1906.exe~R Avira URL Cloud: Label: phishing
Source: https://162.55.53.18:9000/7 Avira URL Cloud: Label: malware
Source: http://5.42.65.116/lumma1906_2.exe Avira URL Cloud: Label: phishing
Source: https://falseaudiencekd.shop/api Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/msvcp140.dll Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/G Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/softokn3.dll Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/freebl3.dllO.&d Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/vcruntime140.dll000/nss3.dll Avira URL Cloud: Label: malware
Source: feighminoritsjda.shop Avira URL Cloud: Label: malware
Source: https://strwawrunnygjwu.shop/api Avira URL Cloud: Label: malware
Source: http://5.42.65.116/vidar1906.exe Avira URL Cloud: Label: phishing
Source: https://162.55.53.18:9000/l Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/nss3.dlloft Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/vcruntime140.dll;NTd& Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/2f2b3osoft Avira URL Cloud: Label: malware
Source: https://162.55.53.18/; Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/vcruntime140.dll Avira URL Cloud: Label: malware
Source: https://richardflorespoew.shop/api Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/freebl3.dll Avira URL Cloud: Label: malware
Source: http://5.42.65.116/lumma1906_2.exelF Avira URL Cloud: Label: phishing
Source: https://162.55.53.18:9000/softokn3.dll2 Avira URL Cloud: Label: malware
Source: https://steamcommunity.com/profiles/76561199699680841 Avira URL Cloud: Label: malware
Source: https://justifycanddidatewd.shop/api Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/mozglue.dll Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/.53.18:9000/ Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/nss3.dll$ Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/softokn3.dllEdge Avira URL Cloud: Label: malware
Source: http://5.42.65.116/lumma1906_2.exes Avira URL Cloud: Label: phishing
Source: https://162.55.53.18:9000/sqlt.dll Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/.53.18:9000/0 Avira URL Cloud: Label: malware
Source: http://5.42.65.116/rise1906.exe Avira URL Cloud: Label: phishing
Source: https://162.55.53.18:9000/msvcp140.dllEdge Avira URL Cloud: Label: malware
Source: http://5.42.65.116/vidar1906.exeance.com Avira URL Cloud: Label: phishing
Source: https://162.55.53.18:9000/vcruntime140.dllUser Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/vcruntime140.dllw Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/freebl3.dllQ. Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/vcruntime140.dllc Avira URL Cloud: Label: malware
Source: https://162.55.53.18:9000/ Avira URL Cloud: Label: malware
Source: marathonbeedksow.shop Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vidar1906[1].exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\lumma1906_2[1].exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\rise1906[1].exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Avira: detection malicious, Label: HEUR/AGEN.1317017
Source: 00000016.00000002.1855823531.0000000000778000.00000004.00000001.01000000.00000009.sdmp Malware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199699680841", "https://t.me/memve4erin"], "Botnet": "cac73a25dd295fef8853d330a75f6da4"}
Source: 38.2.MSIUpdaterV168.exe.d80000.0.unpack Malware Configuration Extractor: LummaC {"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "justifycanddidatewd.shop"], "Build id": "H8NgCl--default"}
Source: justifycanddidatewd.shop Virustotal: Detection: 13% Perma Link
Source: strwawrunnygjwu.shop Virustotal: Detection: 13% Perma Link
Source: richardflorespoew.shop Virustotal: Detection: 14% Perma Link
Source: falseaudiencekd.shop Virustotal: Detection: 13% Perma Link
Source: marathonbeedksow.shop Virustotal: Detection: 14% Perma Link
Source: raiseboltskdlwpow.shop Virustotal: Detection: 13% Perma Link
Source: feighminoritsjda.shop Virustotal: Detection: 12% Perma Link
Source: pleasurenarrowsdla.shop Virustotal: Detection: 13% Perma Link
Source: https://feighminoritsjda.shop/ Virustotal: Detection: 13% Perma Link
Source: http://5.42.65.116/lumma1906_2.exe Virustotal: Detection: 25% Perma Link
Source: richardflorespoew.shop Virustotal: Detection: 14% Perma Link
Source: https://162.55.53.18:9000/7 Virustotal: Detection: 10% Perma Link
Source: https://falseaudiencekd.shop/api Virustotal: Detection: 15% Perma Link
Source: https://162.55.53.18:9000/msvcp140.dll Virustotal: Detection: 10% Perma Link
Source: raiseboltskdlwpow.shop Virustotal: Detection: 13% Perma Link
Source: http://5.42.65.116/vidar1906.exe Virustotal: Detection: 24% Perma Link
Source: https://162.55.53.18:9000/l Virustotal: Detection: 10% Perma Link
Source: https://strwawrunnygjwu.shop/api Virustotal: Detection: 15% Perma Link
Source: strwawrunnygjwu.shop Virustotal: Detection: 13% Perma Link
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe ReversingLabs: Detection: 65%
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe ReversingLabs: Detection: 63%
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe ReversingLabs: Detection: 65%
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_ba275140a7f982708edd6279b1a14d06\AdobeUpdaterV168.exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513\AdobeUpdaterV168.exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\rise1906[1].exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\lumma1906_2[1].exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vidar1906[1].exe ReversingLabs: Detection: 65%
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe ReversingLabs: Detection: 65%
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe ReversingLabs: Detection: 63%
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe ReversingLabs: Detection: 63%
Source: 1kBeqS7E3z.exe Virustotal: Detection: 52% Perma Link
Source: 1kBeqS7E3z.exe ReversingLabs: Detection: 63%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vidar1906[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\lumma1906_2[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Joe Sandbox ML: detected
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\rise1906[1].exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Joe Sandbox ML: detected
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Joe Sandbox ML: detected
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Joe Sandbox ML: detected
Source: 1kBeqS7E3z.exe Joe Sandbox ML: detected
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: richardflorespoew.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: strwawrunnygjwu.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: justifycanddidatewd.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: raiseboltskdlwpow.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: falseaudiencekd.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: pleasurenarrowsdla.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: feighminoritsjda.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: marathonbeedksow.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: justifycanddidatewd.shop
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: lid=%s&j=%s&ver=4.0
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: TeslaBrowser/5.5
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: - Screen Resoluton:
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: - Physical Installed Memory:
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: Workgroup: -
Source: 0000001F.00000002.1847576009.0000000000400000.00000040.00000400.00020000.00000000.sdmp String decryptor: H8NgCl--default
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C6B00 CryptUnprotectData,CryptUnprotectData,LocalFree,LocalFree, 3_2_004C6B00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_00406DE2 CryptUnprotectData,LocalAlloc,LocalFree, 23_2_00406DE2
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_00406D7F CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree, 23_2_00406D7F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_00408E1E lstrlen,CryptStringToBinaryA,lstrcat,lstrcat, 23_2_00408E1E
Source: 1kBeqS7E3z.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49747 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49767 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49774 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49777 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49780 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49781 version: TLS 1.2
Source: 1kBeqS7E3z.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B52923 FindFirstFileExW, 0_2_00B52923
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose, 3_2_004C6000
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E6770 CreateDirectoryA,FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error, 3_2_004E6770
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00493F40 SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA, 3_2_00493F40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00431F9C FindClose,FindFirstFileExW,GetLastError, 3_2_00431F9C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00432022 GetLastError,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx, 3_2_00432022
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose, 3_2_004938D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError, 3_2_004DFF00
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00052923 FindFirstFileExW, 11_2_00052923
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A329D7 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 12_2_00A329D7
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00762933 FindFirstFileExW, 22_2_00762933
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040D1BA FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 23_2_0040D1BA
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040A025 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 23_2_0040A025
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040A440 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 23_2_0040A440
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040AAB4 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, 23_2_0040AAB4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_00401162 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose, 23_2_00401162
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040B4C3 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,FindNextFileA,FindClose, 23_2_0040B4C3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040BFA5 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 23_2_0040BFA5
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\

Networking

barindex
Source: Traffic Snort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49732 -> 5.42.67.8:50500
Source: Traffic Snort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.4:49732
Source: Traffic Snort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49732 -> 5.42.67.8:50500
Source: Traffic Snort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 5.42.67.8:50500 -> 192.168.2.4:49732
Source: Traffic Snort IDS: 2053672 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (justifycanddidatewd .shop) 192.168.2.4:57238 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053682 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (marathonbeedksow .shop) 192.168.2.4:61750 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053680 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (feighminoritsjda .shop) 192.168.2.4:57326 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053678 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pleasurenarrowsdla .shop) 192.168.2.4:54451 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053676 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (falseaudiencekd .shop) 192.168.2.4:60625 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053674 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (raiseboltskdlwpow .shop) 192.168.2.4:53564 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053670 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strwawrunnygjwu .shop) 192.168.2.4:59171 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2053668 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (richardflorespoew .shop) 192.168.2.4:53588 -> 1.1.1.1:53
Source: Traffic Snort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.4:49751
Source: Traffic Snort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.4:49760
Source: Traffic Snort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.4:49772
Source: Traffic Snort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.4:49778
Source: Malware configuration extractor URLs: richardflorespoew.shop
Source: Malware configuration extractor URLs: strwawrunnygjwu.shop
Source: Malware configuration extractor URLs: justifycanddidatewd.shop
Source: Malware configuration extractor URLs: raiseboltskdlwpow.shop
Source: Malware configuration extractor URLs: falseaudiencekd.shop
Source: Malware configuration extractor URLs: pleasurenarrowsdla.shop
Source: Malware configuration extractor URLs: feighminoritsjda.shop
Source: Malware configuration extractor URLs: marathonbeedksow.shop
Source: Malware configuration extractor URLs: justifycanddidatewd.shop
Source: Malware configuration extractor URLs: https://steamcommunity.com/profiles/76561199699680841
Source: Malware configuration extractor URLs: https://t.me/memve4erin
Source: global traffic TCP traffic: 192.168.2.4:49732 -> 5.42.67.8:50500
Source: global traffic TCP traffic: 192.168.2.4:49750 -> 162.55.53.18:9000
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 20 Jun 2024 04:49:09 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Tue, 18 Jun 2024 22:33:06 GMTETag: "1cc400-61b31aa6abb30"Accept-Ranges: bytesContent-Length: 1885184Content-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 19 b3 f5 7c 5d d2 9b 2f 5d d2 9b 2f 5d d2 9b 2f 8e a0 98 2e 4c d2 9b 2f 8e a0 9e 2e ec d2 9b 2f 8e a0 9f 2e 4b d2 9b 2f 9f 53 9f 2e 4f d2 9b 2f 9f 53 98 2e 48 d2 9b 2f 8e a0 9a 2e 54 d2 9b 2f 5d d2 9a 2f dc d2 9b 2f 9f 53 9e 2e 0a d2 9b 2f ae 50 9e 2e 5c d2 9b 2f ae 50 99 2e 5c d2 9b 2f 52 69 63 68 5d d2 9b 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 1f 0b 72 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 27 00 b0 02 00 00 22 1a 00 00 00 00 00 b9 b7 00 00 00 10 00 00 00 c0 02 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 f0 1c 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 1c 6c 03 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 1c 00 ec 1f 00 00 a8 4b 03 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 4a 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 02 00 40 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 50 ae 02 00 00 10 00 00 00 b0 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5e b3 00 00 00 c0 02 00 00 b4 00 00 00 b4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a8 4c 19 00 00 80 03 00 00 3c 19 00 00 68 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 ec 1f 00 00 00 d0 1c 00 00 20 00 00 00 a4 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 20 Jun 2024 04:49:12 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Tue, 18 Jun 2024 22:35:39 GMTETag: "6dc00-61b31b38bbc25"Accept-Ranges: bytesContent-Length: 449536Content-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 19 b3 f5 7c 5d d2 9b 2f 5d d2 9b 2f 5d d2 9b 2f 8e a0 98 2e 4c d2 9b 2f 8e a0 9e 2e ec d2 9b 2f 8e a0 9f 2e 4b d2 9b 2f 9f 53 9f 2e 4f d2 9b 2f 9f 53 98 2e 48 d2 9b 2f 8e a0 9a 2e 54 d2 9b 2f 5d d2 9a 2f dc d2 9b 2f 9f 53 9e 2e 0a d2 9b 2f ae 50 9e 2e 5c d2 9b 2f ae 50 99 2e 5c d2 9b 2f 52 69 63 68 5d d2 9b 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 b9 0b 72 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 27 00 b0 02 00 00 3a 04 00 00 00 00 00 c9 b7 00 00 00 10 00 00 00 c0 02 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 10 07 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 1c 6c 03 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 06 00 ec 1f 00 00 a8 4b 03 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 4a 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 02 00 40 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 60 ae 02 00 00 10 00 00 00 b0 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5e b3 00 00 00 c0 02 00 00 b4 00 00 00 b4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 68 64 03 00 00 80 03 00 00 54 03 00 00 68 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 ec 1f 00 00 00 f0 06 00 00 20 00 00 00 bc 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 20 Jun 2024 04:49:14 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Tue, 18 Jun 2024 22:38:14 GMTETag: "83600-61b31bcbd0b2c"Accept-Ranges: bytesContent-Length: 538112Content-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 19 b3 f5 7c 5d d2 9b 2f 5d d2 9b 2f 5d d2 9b 2f 8e a0 98 2e 4c d2 9b 2f 8e a0 9e 2e ec d2 9b 2f 8e a0 9f 2e 4b d2 9b 2f 9f 53 9f 2e 4f d2 9b 2f 9f 53 98 2e 48 d2 9b 2f 8e a0 9a 2e 54 d2 9b 2f 5d d2 9a 2f dc d2 9b 2f 9f 53 9e 2e 0a d2 9b 2f ae 50 9e 2e 5c d2 9b 2f ae 50 99 2e 5c d2 9b 2f 52 69 63 68 5d d2 9b 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 4d 0c 72 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 27 00 b0 02 00 00 94 05 00 00 00 00 00 c9 b7 00 00 00 10 00 00 00 c0 02 00 00 00 40 00 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 60 08 00 00 04 00 00 00 00 00 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 1c 6c 03 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 08 00 ec 1f 00 00 a8 4b 03 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 4a 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 c0 02 00 40 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 60 ae 02 00 00 10 00 00 00 b0 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5e b3 00 00 00 c0 02 00 00 b4 00 00 00 b4 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a8 be 04 00 00 80 03 00 00 ae 04 00 00 68 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 ec 1f 00 00 00 40 08 00 00 20 00 00 00 16 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /memve4erin HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox View IP Address: 34.117.186.192 34.117.186.192
Source: Joe Sandbox View IP Address: 34.117.186.192 34.117.186.192
Source: Joe Sandbox View IP Address: 162.55.53.18 162.55.53.18
Source: Joe Sandbox View IP Address: 5.42.67.8 5.42.67.8
Source: Joe Sandbox View IP Address: 104.26.4.15 104.26.4.15
Source: Joe Sandbox View ASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknown DNS query: name: ipinfo.io
Source: unknown DNS query: name: ipinfo.io
Source: unknown DNS query: name: ipinfo.io
Source: unknown DNS query: name: ipinfo.io
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: HEAD /rise1906.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /rise1906.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: HEAD /vidar1906.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /vidar1906.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: HEAD /lumma1906_2.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /lumma1906_2.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: unknown TCP traffic detected without corresponding DNS query: 5.42.67.8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C8590 recv,WSAStartup,getaddrinfo,closesocket,socket,connect,closesocket,freeaddrinfo,WSACleanup,freeaddrinfo, 3_2_004C8590
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /memve4erin HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
Source: global traffic HTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
Source: global traffic HTTP traffic detected: GET /rise1906.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /vidar1906.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /lumma1906_2.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
Source: global traffic DNS traffic detected: DNS query: ipinfo.io
Source: global traffic DNS traffic detected: DNS query: db-ip.com
Source: global traffic DNS traffic detected: DNS query: t.me
Source: global traffic DNS traffic detected: DNS query: justifycanddidatewd.shop
Source: global traffic DNS traffic detected: DNS query: marathonbeedksow.shop
Source: global traffic DNS traffic detected: DNS query: feighminoritsjda.shop
Source: global traffic DNS traffic detected: DNS query: pleasurenarrowsdla.shop
Source: global traffic DNS traffic detected: DNS query: falseaudiencekd.shop
Source: global traffic DNS traffic detected: DNS query: raiseboltskdlwpow.shop
Source: global traffic DNS traffic detected: DNS query: strwawrunnygjwu.shop
Source: global traffic DNS traffic detected: DNS query: richardflorespoew.shop
Source: RegAsm.exe, 00000017.00000002.4148168459.0000000000453000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: Https://162.55.53.18:9000al
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/lumma1906_2.exe
Source: RegAsm.exe, 00000003.00000002.1876952475.000000000579F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/lumma1906_2.exelF
Source: RegAsm.exe, 00000003.00000002.1876952475.000000000579F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/lumma1906_2.exes
Source: RegAsm.exe, 00000003.00000002.1876914616.0000000005773000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/rise1906.exe
Source: RegAsm.exe, 00000003.00000002.1876914616.0000000005773000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/rise1906.exe~R
Source: RegAsm.exe, 00000003.00000002.1876952475.000000000579F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/vidar1906.exe
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://5.42.65.116/vidar1906.exeance.com
Source: RegAsm.exe, 00000017.00000002.4149119694.0000000001141000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: RegAsm.exe, 00000003.00000002.1876041110.000000000149D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ns.adp/1.0/
Source: RegAsm.exe, 00000003.00000002.1876041110.000000000149D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ns.exif/1b
Source: RegAsm.exe, 00000003.00000002.1876041110.000000000149D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ns.microsofo/1.2/
Source: Amcache.hve.6.dr String found in binary or memory: http://upx.sf.net
Source: RegAsm.exe, 00000017.00000002.4154237798.000000001B9BD000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.23.dr String found in binary or memory: http://www.sqlite.org/copyright.html.
Source: 1kBeqS7E3z.exe, 00000000.00000002.1813652869.0000000000B68000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.1874108431.0000000000400000.00000040.00000400.00020000.00000000.sdmp, JNXEsB3lt_ta57yvH0nX.exe, 0000000B.00000002.1855690126.0000000000068000.00000004.00000001.01000000.00000007.sdmp, MSIUpdaterV168.exe, 0000000C.00000002.1889587614.0000000000A48000.00000004.00000001.01000000.00000008.sdmp, MSIUpdaterV168.exe, 00000010.00000002.1932454219.0000000000A48000.00000004.00000001.01000000.00000008.sdmp String found in binary or memory: http://www.winimage.com/zLibDll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18/
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18/;
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000123A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4149531990.0000000001230000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000123A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/.53.18:9000/
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000123A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/.53.18:9000/0
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/2f2b3osoft
Source: RegAsm.exe, 00000017.00000002.4149531990.0000000001230000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/7
Source: RegAsm.exe, 00000017.00000002.4149675758.0000000001292000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/;P
Source: RegAsm.exe, 00000017.00000002.4149531990.0000000001230000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/G
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/freebl3.dll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/freebl3.dllO.&d
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/freebl3.dllQ.
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/l
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/mozglue.dll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/mozglue.dllD.
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000123A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/msvcp140.dll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/msvcp140.dll2.-d
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/msvcp140.dllEdge
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/nss3.dll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/nss3.dll$
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000125A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/nss3.dll_
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/nss3.dlloft
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/softokn3.dll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/softokn3.dll2
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/softokn3.dllEdge
Source: RegAsm.exe, 00000017.00000002.4148168459.0000000000491000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/sqlt.dll
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/vcruntime140.dll
Source: RegAsm.exe, 00000017.00000002.4149342219.0000000001179000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/vcruntime140.dll000/nss3.dll
Source: RegAsm.exe, 00000017.00000002.4149696062.000000000129B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/vcruntime140.dll;NTd&
Source: RegAsm.exe, 00000017.00000002.4148168459.0000000000453000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/vcruntime140.dllUser
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000123A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/vcruntime140.dllc
Source: RegAsm.exe, 00000017.00000002.4149531990.000000000123A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000/vcruntime140.dllw
Source: RegAsm.exe, 00000017.00000002.4148168459.0000000000453000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000AEBMac
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000al
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000ming
Source: RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://162.55.53.18:9000tel
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://ac.ecosia.org/autocomplete?q=
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/9
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/?
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/J
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33d
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33n
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33rl9
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33j
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33s-origin
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://duckduckgo.com/ac/?q=
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: RegAsm.exe, 0000002D.00000002.1894402221.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://falseaudiencekd.shop/api
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://falseaudiencekd.shop/e?
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://feighminoritsjda.shop/
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1945728277.00000000015C1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1945728277.00000000015CB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/
Source: RegAsm.exe, 0000002C.00000002.1945728277.00000000015CB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/#
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011E2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/=s
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011F0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.1911199753.0000000001524000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/Mozilla/5.0
Source: RegAsm.exe, 0000000E.00000002.1910899704.00000000014DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/d
Source: 1kBeqS7E3z.exe, 00000000.00000002.1813652869.0000000000B68000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1874108431.0000000000400000.00000040.00000400.00020000.00000000.sdmp, JNXEsB3lt_ta57yvH0nX.exe, 0000000B.00000002.1855690126.0000000000068000.00000004.00000001.01000000.00000007.sdmp, MSIUpdaterV168.exe, 0000000C.00000002.1889587614.0000000000A48000.00000004.00000001.01000000.00000008.sdmp, MSIUpdaterV168.exe, 00000010.00000002.1932454219.0000000000A48000.00000004.00000001.01000000.00000008.sdmp String found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001508000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.00000000015FC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1945728277.00000000015BC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011C6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33o98
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011F0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.33
Source: RegAsm.exe, 0000001F.00000002.1850230800.0000000001124000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002D.00000002.1894402221.0000000000B7B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://justifycanddidatewd.shop/
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://justifycanddidatewd.shop/api
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://justifycanddidatewd.shop/apiK3
Source: RegAsm.exe, 0000001F.00000002.1850230800.0000000001124000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://justifycanddidatewd.shop/apie
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://marathonbeedksow.shop/
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://raiseboltskdlwpow.shop/
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://raiseboltskdlwpow.shop/api
Source: RegAsm.exe, 0000002D.00000002.1894402221.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://richardflorespoew.shop/
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://richardflorespoew.shop/P?
Source: RegAsm.exe, 0000002D.00000002.1894402221.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://richardflorespoew.shop/T
Source: RegAsm.exe, 0000001F.00000002.1850230800.0000000001124000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001F.00000002.1850230800.000000000111B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002D.00000002.1894402221.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002D.00000002.1894402221.0000000000B9C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://richardflorespoew.shop/api
Source: EWDN0G9BRDazVJeatNlA.exe, 00000016.00000002.1855823531.0000000000778000.00000004.00000001.01000000.00000009.sdmp, MSIUpdaterV168.exe, 00000021.00000002.1878372418.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, MSIUpdaterV168.exe, 00000022.00000002.1917031958.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, RegAsm.exe, 0000002B.00000002.4148163051.0000000000415000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://steamcommunity.com/profiles/76561199699680841
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002D.00000002.1894402221.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://strwawrunnygjwu.shop/
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://strwawrunnygjwu.shop/4
Source: RegAsm.exe, 0000002D.00000002.1894402221.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://strwawrunnygjwu.shop/api
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://support.mozilla.org
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, kDUu8k2pH1QBHistory.3.dr, CBGHCA.23.dr, YN77R9Xqtqt0History.3.dr String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
Source: kDUu8k2pH1QBHistory.3.dr, CBGHCA.23.dr, YN77R9Xqtqt0History.3.dr String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
Source: RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
Source: RegAsm.exe, 00000017.00000002.4148168459.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, kDUu8k2pH1QBHistory.3.dr, CBGHCA.23.dr, YN77R9Xqtqt0History.3.dr String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
Source: kDUu8k2pH1QBHistory.3.dr, CBGHCA.23.dr, YN77R9Xqtqt0History.3.dr String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
Source: RegAsm.exe, 00000017.00000002.4148168459.00000000004D5000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.d
Source: RegAsm.exe, 00000017.00000002.4149119694.00000000010EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/
Source: RegAsm.exe, 0000000E.00000002.1910899704.00000000014AA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1945728277.000000000158A000.00000004.00000020.00020000.00000000.sdmp, U4XS0oCaLxVS1ZKFaAUvhYs.zip.3.dr String found in binary or memory: https://t.me/RiseProSUPPORT
Source: RegAsm.exe, 00000017.00000002.4149119694.0000000001141000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.0000000000453000.00000040.00000400.00020000.00000000.sdmp, MSIUpdaterV168.exe, 00000021.00000002.1878372418.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, MSIUpdaterV168.exe, 00000022.00000002.1917031958.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, RegAsm.exe, 0000002B.00000002.4148163051.0000000000415000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://t.me/memve4erin
Source: RegAsm.exe, 00000017.00000002.4149119694.0000000001141000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/memve4erinB
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp, passwords.txt.3.dr String found in binary or memory: https://t.me/risepro_bot
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_bot33
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_bot:
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_botg
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://t.me/risepro_botrisepro
Source: RegAsm.exe, 00000017.00000002.4149119694.0000000001141000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4148168459.0000000000453000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://web.telegram.org
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://www.ecosia.org/newtab/
Source: GCBGII.23.dr, kl0jrgyIxoShWeb Data.3.dr, PnyjCEPqoDB2Web Data.3.dr, ZBGIzoCvJpJYWeb Data.3.dr String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: RegAsm.exe String found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://www.mozilla.org
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp, Firefox_fqs92o4p.default-release.txt.3.dr String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
Source: RegAsm.exe, 00000003.00000002.1876578263.0000000005752000.00000004.00000020.00020000.00000000.sdmp, 3b6N2Xdh3CYwplaces.sqlite.3.dr, D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
Source: D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp, Firefox_fqs92o4p.default-release.txt.3.dr String found in binary or memory: https://www.mozilla.org/privacy/firefox/
Source: RegAsm.exe, 00000003.00000002.1876578263.0000000005752000.00000004.00000020.00020000.00000000.sdmp, 3b6N2Xdh3CYwplaces.sqlite.3.dr, D87fZN3R3jFeplaces.sqlite.3.dr String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.mozilla.org/privacy/firefox/txt
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49777
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49774
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49781
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49780
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49767 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49747 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49780 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49781 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 49777 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49747
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 49774 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49767
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49739 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49740 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.4:49747 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49757 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49767 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49774 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49777 version: TLS 1.2
Source: unknown HTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49780 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.26.4.15:443 -> 192.168.2.4:49781 version: TLS 1.2
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E5FF0 GdiplusStartup,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,DeleteObject,GdipDisposeImage,DeleteObject,ReleaseDC,GdiplusShutdown, 3_2_004E5FF0

System Summary

barindex
Source: 43.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 22.2.EWDN0G9BRDazVJeatNlA.exe.740000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 33.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: 34.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE Matched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B468F6 0_2_00B468F6
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B41AC3 0_2_00B41AC3
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B43A70 0_2_00B43A70
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B35C90 0_2_00B35C90
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B56C34 0_2_00B56C34
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B4FECD 0_2_00B4FECD
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3C7E0 0_2_00B3C7E0
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B4BFC9 0_2_00B4BFC9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0044002D 3_2_0044002D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C00A0 3_2_004C00A0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004A6250 3_2_004A6250
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004AA200 3_2_004AA200
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0040A2C0 3_2_0040A2C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0050A2B0 3_2_0050A2B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004BE3C0 3_2_004BE3C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004963B0 3_2_004963B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004DE430 3_2_004DE430
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004B84D0 3_2_004B84D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004FA480 3_2_004FA480
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00514550 3_2_00514550
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00490600 3_2_00490600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E06D0 3_2_004E06D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004986B0 3_2_004986B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004A88B0 3_2_004A88B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004FA930 3_2_004FA930
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E4BD0 3_2_004E4BD0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004FAD00 3_2_004FAD00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0049AF60 3_2_0049AF60
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004DF030 3_2_004DF030
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0049F0D0 3_2_0049F0D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0049D3A0 3_2_0049D3A0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0053F550 3_2_0053F550
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004B3600 3_2_004B3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D7600 3_2_004D7600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004B1630 3_2_004B1630
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00495790 3_2_00495790
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0040B8E0 3_2_0040B8E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0048BAC8 3_2_0048BAC8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004ADB20 3_2_004ADB20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00481C10 3_2_00481C10
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00409C90 3_2_00409C90
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F7D00 3_2_004F7D00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00493F40 3_2_00493F40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C1F20 3_2_004C1F20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_005220D0 3_2_005220D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F60E0 3_2_004F60E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004EE170 3_2_004EE170
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0048611D 3_2_0048611D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0044036F 3_2_0044036F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004A4320 3_2_004A4320
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F0450 3_2_004F0450
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004845E0 3_2_004845E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F85F0 3_2_004F85F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004547BF 3_2_004547BF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F2820 3_2_004F2820
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0043C960 3_2_0043C960
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00546970 3_2_00546970
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0043A928 3_2_0043A928
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F8B40 3_2_004F8B40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00458BB0 3_2_00458BB0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004EEC40 3_2_004EEC40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00534D40 3_2_00534D40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00546D20 3_2_00546D20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0053AE20 3_2_0053AE20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00458E30 3_2_00458E30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00506EA0 3_2_00506EA0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00516EA0 3_2_00516EA0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004ECF20 3_2_004ECF20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F2FD0 3_2_004F2FD0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00493080 3_2_00493080
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004371A0 3_2_004371A0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_005031A0 3_2_005031A0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004A9380 3_2_004A9380
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D1450 3_2_004D1450
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0042F580 3_2_0042F580
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004A3610 3_2_004A3610
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CF6F0 3_2_004CF6F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00547760 3_2_00547760
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F7730 3_2_004F7730
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E77E0 3_2_004E77E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_005397B0 3_2_005397B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F7960 3_2_004F7960
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0047B970 3_2_0047B970
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004EF9A0 3_2_004EF9A0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CBAC0 3_2_004CBAC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0044DA86 3_2_0044DA86
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0051DBB0 3_2_0051DBB0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004EFC40 3_2_004EFC40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F7C00 3_2_004F7C00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00503CC0 3_2_00503CC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004F9D70 3_2_004F9D70
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00545DE0 3_2_00545DE0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00501FE0 3_2_00501FE0
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_000468F6 11_2_000468F6
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00043A70 11_2_00043A70
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00041AC3 11_2_00041AC3
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00054B0E 11_2_00054B0E
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00056C34 11_2_00056C34
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00035C90 11_2_00035C90
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0004FECD 11_2_0004FECD
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0004BFC9 11_2_0004BFC9
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0003C7E0 11_2_0003C7E0
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A268F6 12_2_00A268F6
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A21AC3 12_2_00A21AC3
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A23A70 12_2_00A23A70
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A15C90 12_2_00A15C90
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A36C34 12_2_00A36C34
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A2FECD 12_2_00A2FECD
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A1C7E0 12_2_00A1C7E0
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A2BFC9 12_2_00A2BFC9
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00756908 22_2_00756908
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00751AD3 22_2_00751AD3
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00753A80 22_2_00753A80
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00764B1E 22_2_00764B1E
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00766C44 22_2_00766C44
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00745CA0 22_2_00745CA0
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0075FEDD 22_2_0075FEDD
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0074C7F0 22_2_0074C7F0
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0075BFD9 22_2_0075BFD9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B784CF0 23_2_1B784CF0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B899A20 23_2_1B899A20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B772018 23_2_1B772018
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B825940 23_2_1B825940
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B771C9E 23_2_1B771C9E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B772AA9 23_2_1B772AA9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7712A8 23_2_1B7712A8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8D9CC0 23_2_1B8D9CC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77292D 23_2_1B77292D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B773580 23_2_1B773580
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8053B0 23_2_1B8053B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B94D209 23_2_1B94D209
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B789000 23_2_1B789000
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B895040 23_2_1B895040
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B819690 23_2_1B819690
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8D9430 23_2_1B8D9430
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B874A60 23_2_1B874A60
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B771EF1 23_2_1B771EF1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B798D2A 23_2_1B798D2A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B773AB2 23_2_1B773AB2
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7F8120 23_2_1B7F8120
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B898030 23_2_1B898030
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7F0090 23_2_1B7F0090
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B798763 23_2_1B798763
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7D4760 23_2_1B7D4760
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B808760 23_2_1B808760
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B798680 23_2_1B798680
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8B0480 23_2_1B8B0480
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B79BAB0 23_2_1B79BAB0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77251D 23_2_1B77251D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77290A 23_2_1B77290A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7A3370 23_2_1B7A3370
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77174E 23_2_1B77174E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77AA40 23_2_1B77AA40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77EA80 23_2_1B77EA80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8569C0 23_2_1B8569C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B88A900 23_2_1B88A900
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B86A940 23_2_1B86A940
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77481D 23_2_1B77481D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8AE800 23_2_1B8AE800
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B773E3B 23_2_1B773E3B
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B94AEBE 23_2_1B94AEBE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7D2EE0 23_2_1B7D2EE0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7719DD 23_2_1B7719DD
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B77209F 23_2_1B77209F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7FA0B0 23_2_1B7FA0B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7866C0 23_2_1B7866C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B86A590 23_2_1B86A590
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B79A560 23_2_1B79A560
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7747AF 23_2_1B7747AF
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sqlt[1].dll 036A57102385D7F0D7B2DEACF932C1C372AE30D924365B7A88F8A26657DD7550
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: String function: 00A1C290 appears 56 times
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: String function: 0074C2A0 appears 56 times
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: String function: 0003C290 appears 56 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 1B771C2B appears 47 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 1B77415B appears 118 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 00547510 appears 95 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 0041ACE0 appears 145 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 1B9506B1 appears 36 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 1B77395E appears 78 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 1B771F5A appears 31 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 00434380 appears 59 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: String function: 00402CF0 appears 111 times
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: String function: 00B3C290 appears 56 times
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 288
Source: 1kBeqS7E3z.exe, 00000000.00000002.1813652869.0000000000B68000.00000004.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamedotnet.exe6 vs 1kBeqS7E3z.exe
Source: 1kBeqS7E3z.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 43.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 22.2.EWDN0G9BRDazVJeatNlA.exe.740000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 33.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 34.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
Source: 1kBeqS7E3z.exe Static PE information: Section: .data ZLIB complexity 0.9977245791408669
Source: rise1906[1].exe.3.dr Static PE information: Section: .data ZLIB complexity 0.9977245791408669
Source: JNXEsB3lt_ta57yvH0nX.exe.3.dr Static PE information: Section: .data ZLIB complexity 0.9977245791408669
Source: AdobeUpdaterV168.exe0.3.dr Static PE information: Section: .data ZLIB complexity 0.9977245791408669
Source: MSIUpdaterV168.exe0.3.dr Static PE information: Section: .data ZLIB complexity 0.9977245791408669
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@71/60@12/6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_005447E0 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA, 3_2_005447E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00544A40 GetDiskFreeSpaceW,GetDiskFreeSpaceA, 3_2_00544A40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey, 3_2_004E06D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0048BAC8 CopyFileA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,CopyFileA,GetUserNameA,CopyFileA,SHGetFolderPathA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,ShellExecuteA, 3_2_0048BAC8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\signons.sqlite Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7064
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7032
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3900:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7100:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7080:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5244:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6884:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6736
Source: C:\Windows\SysWOW64\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6668
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\trixy5OrBOMtvc8QO Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Command line argument: Alister 0_2_00B38E90
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Command line argument: Alister 11_2_00038E90
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Command line argument: Alister 12_2_00A18E90
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Command line argument: Alister 22_2_00748EA0
Source: 1kBeqS7E3z.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: RegAsm.exe, 00000017.00000002.4149766607.00000000035A5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: SELECT url FROM urls LIMIT 1000;
Source: 1kBeqS7E3z.exe, 00000000.00000002.1813652869.0000000000B68000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000003.00000002.1874108431.0000000000400000.00000040.00000400.00020000.00000000.sdmp, JNXEsB3lt_ta57yvH0nX.exe, 0000000B.00000002.1855690126.0000000000068000.00000004.00000001.01000000.00000007.sdmp, MSIUpdaterV168.exe, 0000000C.00000002.1889587614.0000000000A48000.00000004.00000001.01000000.00000008.sdmp, MSIUpdaterV168.exe, 00000010.00000002.1932454219.0000000000A48000.00000004.00000001.01000000.00000008.sdmp Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
Source: RegAsm.exe, RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
Source: 1kBeqS7E3z.exe, 00000000.00000002.1813652869.0000000000B68000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1874108431.0000000000400000.00000040.00000400.00020000.00000000.sdmp, JNXEsB3lt_ta57yvH0nX.exe, 0000000B.00000002.1855690126.0000000000068000.00000004.00000001.01000000.00000007.sdmp, MSIUpdaterV168.exe, 0000000C.00000002.1889587614.0000000000A48000.00000004.00000001.01000000.00000008.sdmp, MSIUpdaterV168.exe, 00000010.00000002.1932454219.0000000000A48000.00000004.00000001.01000000.00000008.sdmp Binary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
Source: RegAsm.exe, RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
Source: f6uxhjQDDMXqLogin Data.3.dr, AmXZnh1xJmbtLogin Data For Account.3.dr, GIEHJK.23.dr Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: RegAsm.exe, RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
Source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr Binary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
Source: 1kBeqS7E3z.exe Virustotal: Detection: 52%
Source: 1kBeqS7E3z.exe ReversingLabs: Detection: 63%
Source: RegAsm.exe String found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
Source: unknown Process created: C:\Users\user\Desktop\1kBeqS7E3z.exe "C:\Users\user\Desktop\1kBeqS7E3z.exe"
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 288
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_bdca866007fb255201297d2a15a49513 HR" /sc HOURLY /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_bdca866007fb255201297d2a15a49513 LG" /sc ONLOGON /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe"
Source: unknown Process created: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: unknown Process created: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 296
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_22594e13276480dd456a8441babc227b HR" /sc HOURLY /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_22594e13276480dd456a8441babc227b LG" /sc ONLOGON /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe"
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7032 -s 260
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06 HR" /sc HOURLY /rl HIGHEST
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06 LG" /sc ONLOGON /rl HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe"
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: unknown Process created: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe
Source: unknown Process created: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Process created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6736 -s 276
Source: unknown Process created: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe
Source: unknown Process created: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_bdca866007fb255201297d2a15a49513 HR" /sc HOURLY /rl HIGHEST Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_bdca866007fb255201297d2a15a49513 LG" /sc ONLOGON /rl HIGHEST Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_22594e13276480dd456a8441babc227b HR" /sc HOURLY /rl HIGHEST Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_22594e13276480dd456a8441babc227b LG" /sc ONLOGON /rl HIGHEST Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06 HR" /sc HOURLY /rl HIGHEST Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06 LG" /sc ONLOGON /rl HIGHEST Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: d3d11.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dxgi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: d3d10warp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dxcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: acgenral.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: winmm.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: samcli.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: msacm32.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: version.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: userenv.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: mpr.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: netutils.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: sfc.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rstrtmgr.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: d3d11.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dxgi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: resourcepolicyclient.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: d3d10warp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dxcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: devobj.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: webio.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: acgenral.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: winmm.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: samcli.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: msacm32.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: version.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: userenv.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: mpr.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: netutils.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: sfc.dll Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wininet.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rstrtmgr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dbghelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.storage.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wldp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: profapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: urlmon.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: srvcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: netutils.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: schannel.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mskeyprotect.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: gpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wbemcomn.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: amsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sxs.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: webio.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: apphelp.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: acgenral.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: uxtheme.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: winmm.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: samcli.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: msacm32.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: version.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: userenv.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: dwmapi.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: urlmon.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: mpr.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: sspicli.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: iertutil.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: srvcli.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: netutils.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: aclayers.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: sfc.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: sfc_os.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: apphelp.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: acgenral.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: uxtheme.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: winmm.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: samcli.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: msacm32.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: version.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: userenv.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: dwmapi.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: urlmon.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: mpr.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: sspicli.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: iertutil.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: srvcli.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: netutils.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: aclayers.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: sfc.dll
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Section loaded: sfc_os.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: apphelp.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: acgenral.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: uxtheme.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: winmm.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: samcli.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: msacm32.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: version.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: userenv.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: dwmapi.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: urlmon.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: mpr.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: sspicli.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: iertutil.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: srvcli.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: netutils.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: aclayers.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: sfc.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: sfc_os.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: apphelp.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: acgenral.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: uxtheme.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: winmm.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: samcli.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: msacm32.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: version.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: userenv.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: dwmapi.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: urlmon.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: mpr.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: sspicli.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: winmmbase.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: iertutil.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: srvcli.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: netutils.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: aclayers.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: sfc.dll
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: acgenral.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmm.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: samcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msacm32.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dwmapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: urlmon.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmmbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmmbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: srvcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: netutils.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: acgenral.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmm.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: samcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msacm32.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dwmapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: urlmon.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmmbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmmbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: srvcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: netutils.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rstrtmgr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: d3d11.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dxgi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: resourcepolicyclient.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: d3d10warp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dxcore.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wininet.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: devobj.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: webio.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: fwpuclnt.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: schannel.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mskeyprotect.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncryptsslp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptsp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rsaenh.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: gpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: acgenral.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmm.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: samcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msacm32.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: version.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dwmapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: urlmon.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmmbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winmmbase.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iertutil.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: srvcli.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: netutils.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: webio.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: 1kBeqS7E3z.exe Static file information: File size 1885184 > 1048576
Source: 1kBeqS7E3z.exe Static PE information: Raw size of .data is bigger than: 0x100000 < 0x193c00
Source: 1kBeqS7E3z.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 1kBeqS7E3z.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000017.00000002.4150397506.0000000015A12000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4154077628.000000001B988000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.23.dr
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004595B8 LoadLibraryA,GetProcAddress,MessageBoxA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,GetProcessId,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,SetThreadExecutionState,SetThreadExecutionState,SetThreadExecutionState, 3_2_004595B8
Source: sqlt[1].dll.23.dr Static PE information: section name: .00cfg
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3BA14 push ecx; ret 0_2_00B3BA27
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00433F59 push ecx; ret 3_2_00433F6C
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0003BA14 push ecx; ret 11_2_0003BA27
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A1BA14 push ecx; ret 12_2_00A1BA27
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0074BA24 push ecx; ret 22_2_0074BA37
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B771BF9 push ecx; ret 23_2_1B914C03
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7710C8 push ecx; ret 23_2_1B973552
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\AdobeUpdaterV168_bdca866007fb255201297d2a15a49513\AdobeUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\lumma1906_2[1].exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\AdobeUpdaterV168_22594e13276480dd456a8441babc227b\AdobeUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\AdobeUpdaterV168_ba275140a7f982708edd6279b1a14d06\AdobeUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\rise1906[1].exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sqlt[1].dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vidar1906[1].exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_ba275140a7f982708edd6279b1a14d06 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_22594e13276480dd456a8441babc227b Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe" /tn "MSIUpdaterV168_bdca866007fb255201297d2a15a49513 HR" /sc HOURLY /rl HIGHEST
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_bdca866007fb255201297d2a15a49513 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_22594e13276480dd456a8441babc227b Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_22594e13276480dd456a8441babc227b Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_ba275140a7f982708edd6279b1a14d06 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV168_ba275140a7f982708edd6279b1a14d06 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004EE170 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 3_2_004EE170
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: c:\users\user\desktop\1kbeqs7e3z.exe Event Logs and Signature results: Application crash and keyboard check
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Sandbox detection routine: GetCursorPos, DecisionNode, Sleep
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Evasive API call chain: CreateMutex,DecisionNodes,Sleep
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Evasive API call chain: GetPEB, DecisionNodes, Sleep
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Stalling execution: Execution stalls by calling Sleep
Source: RegAsm.exe, 0000002B.00000002.4148163051.0000000000415000.00000040.00000400.00020000.00000000.sdmp Binary or memory string: AHAL9THJOHNDOEAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos, 3_2_0045DB00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 1851
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 8147
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Decision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sqlt[1].dll Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6792 Thread sleep count: 32 > 30 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4476 Thread sleep count: 113 > 30 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4124 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4124 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7400 Thread sleep count: 1851 > 30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7400 Thread sleep time: -12957000s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7400 Thread sleep count: 8147 > 30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7400 Thread sleep time: -57029000s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7700 Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0041098E GetKeyboardLayoutList followed by cmp: cmp eax, ebx and CTI: jbe 00410AA1h 23_2_0041098E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_005449B0 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 005449F1h 3_2_005449B0
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B52923 FindFirstFileExW, 0_2_00B52923
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose, 3_2_004C6000
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E6770 CreateDirectoryA,FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error, 3_2_004E6770
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00493F40 SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA, 3_2_00493F40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00431F9C FindClose,FindFirstFileExW,GetLastError, 3_2_00431F9C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00432022 GetLastError,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx, 3_2_00432022
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose, 3_2_004938D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError, 3_2_004DFF00
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00052923 FindFirstFileExW, 11_2_00052923
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A329D7 FindFirstFileExW,FindNextFileW,FindClose,FindClose, 12_2_00A329D7
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00762933 FindFirstFileExW, 22_2_00762933
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040D1BA FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose, 23_2_0040D1BA
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040A025 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 23_2_0040A025
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040A440 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 23_2_0040A440
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040AAB4 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA, 23_2_0040AAB4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_00401162 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose, 23_2_00401162
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040B4C3 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,FindNextFileA,FindClose, 23_2_0040B4C3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_0040BFA5 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose, 23_2_0040BFA5
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey, 3_2_004E06D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001508000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWxyS
Source: Amcache.hve.6.dr Binary or memory string: VMware
Source: RegAsm.exe, 0000000E.00000002.1910899704.00000000014A0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
Source: Amcache.hve.6.dr Binary or memory string: VMware Virtual USB Mouse
Source: RegAsm.exe, 0000002C.00000002.1946130070.00000000015FA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: ?\#disk&ven_vmware&prouask#4&1656f219&0&0000f5-b6bf-11d0-94f2-00a08b
Source: Amcache.hve.6.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.6.dr Binary or memory string: VMware, Inc.
Source: RegAsm.exe, 0000000E.00000002.1911199753.0000000001517000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Amcache.hve.6.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: RegAsm.exe, 0000002C.00000002.1946130070.00000000015FC000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}{
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011FF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1875513113.00000000011C6000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.1911199753.0000000001531000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4149119694.00000000010EA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.4149119694.0000000001164000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002C.00000002.1946130070.00000000015EE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: Amcache.hve.6.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: RegAsm.exe, 0000001F.00000002.1850230800.00000000010FA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000002D.00000002.1894402221.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: RegAsm.exe, 0000002B.00000002.4148709510.00000000011C5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware*
Source: Amcache.hve.6.dr Binary or memory string: vmci.sys
Source: Amcache.hve.6.dr Binary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.6.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.6.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: RegAsm.exe, 00000017.00000002.4149119694.0000000001164000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWR
Source: Amcache.hve.6.dr Binary or memory string: VMware20,1
Source: Amcache.hve.6.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: RegAsm.exe, 0000002B.00000002.4148709510.00000000011C5000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: VMwareVMware
Source: Amcache.hve.6.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.dr Binary or memory string: VMware Virtual RAM
Source: RegAsm.exe, 0000002C.00000002.1946130070.0000000001615000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWL
Source: Amcache.hve.6.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: RegAsm.exe, 00000003.00000002.1875513113.00000000011F0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWVY
Source: RegAsm.exe, 0000002C.00000002.1945728277.0000000001580000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&D
Source: Amcache.hve.6.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe API call chain: ExitProcess graph end node
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process queried: DebugPort Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process queried: DebugPort Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process queried: DebugPort Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process queried: DebugPort Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Process queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process queried: DebugPort
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3C03D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00B3C03D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045A102 CreateThread,FindCloseChangeNotification,Sleep,GetTempPathA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,OutputDebugStringA,CreateMutexA,GetLastError,Sleep,Sleep,Sleep,Sleep,shutdown,closesocket,Sleep, 3_2_0045A102
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004595B8 LoadLibraryA,GetProcAddress,MessageBoxA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,GetProcessId,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,SetThreadExecutionState,SetThreadExecutionState,SetThreadExecutionState, 3_2_004595B8
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B50C35 mov eax, dword ptr fs:[00000030h] 0_2_00B50C35
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B49650 mov ecx, dword ptr fs:[00000030h] 0_2_00B49650
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045A102 mov eax, dword ptr fs:[00000030h] 3_2_0045A102
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045A102 mov ecx, dword ptr fs:[00000030h] 3_2_0045A102
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C86C0 mov eax, dword ptr fs:[00000030h] 3_2_004C86C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045A6B7 mov eax, dword ptr fs:[00000030h] 3_2_0045A6B7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045A6B7 mov eax, dword ptr fs:[00000030h] 3_2_0045A6B7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045A6B7 mov eax, dword ptr fs:[00000030h] 3_2_0045A6B7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3070 mov ecx, dword ptr fs:[00000030h] 3_2_004D3070
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004595B8 mov eax, dword ptr fs:[00000030h] 3_2_004595B8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004595B8 mov eax, dword ptr fs:[00000030h] 3_2_004595B8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004595B8 mov eax, dword ptr fs:[00000030h] 3_2_004595B8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004595B8 mov ecx, dword ptr fs:[00000030h] 3_2_004595B8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00495790 mov eax, dword ptr fs:[00000030h] 3_2_00495790
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045DB00 mov eax, dword ptr fs:[00000030h] 3_2_0045DB00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0045DB00 mov eax, dword ptr fs:[00000030h] 3_2_0045DB00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D6280 mov eax, dword ptr fs:[00000030h] 3_2_004D6280
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CA502 mov eax, dword ptr fs:[00000030h] 3_2_004CA502
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CA6B3 mov eax, dword ptr fs:[00000030h] 3_2_004CA6B3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C8C58 mov eax, dword ptr fs:[00000030h] 3_2_004C8C58
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C6D80 mov eax, dword ptr fs:[00000030h] 3_2_004C6D80
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C8E09 mov eax, dword ptr fs:[00000030h] 3_2_004C8E09
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CB15E mov eax, dword ptr fs:[00000030h] 3_2_004CB15E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C9213 mov eax, dword ptr fs:[00000030h] 3_2_004C9213
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CB30F mov eax, dword ptr fs:[00000030h] 3_2_004CB30F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C93CB mov eax, dword ptr fs:[00000030h] 3_2_004C93CB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004D3600 mov eax, dword ptr fs:[00000030h] 3_2_004D3600
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C9B4B mov eax, dword ptr fs:[00000030h] 3_2_004C9B4B
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004C9CFC mov eax, dword ptr fs:[00000030h] 3_2_004C9CFC
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00050C35 mov eax, dword ptr fs:[00000030h] 11_2_00050C35
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_00049650 mov ecx, dword ptr fs:[00000030h] 11_2_00049650
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A30C35 mov eax, dword ptr fs:[00000030h] 12_2_00A30C35
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A29650 mov ecx, dword ptr fs:[00000030h] 12_2_00A29650
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00760C45 mov eax, dword ptr fs:[00000030h] 22_2_00760C45
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_00759660 mov ecx, dword ptr fs:[00000030h] 22_2_00759660
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B55C23 GetProcessHeap, 0_2_00B55C23
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3C03D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00B3C03D
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3C1CA SetUnhandledExceptionFilter, 0_2_00B3C1CA
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3BD36 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_00B3BD36
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3FE53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_00B3FE53
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00434184 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00434184
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00434311 SetUnhandledExceptionFilter, 3_2_00434311
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_0043451D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_00438A64
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0003C03D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 11_2_0003C03D
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0003C1CA SetUnhandledExceptionFilter, 11_2_0003C1CA
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0003BD36 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_0003BD36
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: 11_2_0003FE53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 11_2_0003FE53
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A1C03D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_00A1C03D
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A1C1CA SetUnhandledExceptionFilter, 12_2_00A1C1CA
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A1BD36 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 12_2_00A1BD36
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: 12_2_00A1FE53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_00A1FE53
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0074C04D IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 22_2_0074C04D
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0074C1DA SetUnhandledExceptionFilter, 22_2_0074C1DA
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0074BD46 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 22_2_0074BD46
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: 22_2_0074FE63 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 22_2_0074FE63
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7742AF SetUnhandledExceptionFilter, 23_2_1B7742AF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B772C8E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 23_2_1B772C8E

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Yara match File source: Process Memory Space: EWDN0G9BRDazVJeatNlA.exe PID: 7032, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 7124, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSIUpdaterV168.exe PID: 7176, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSIUpdaterV168.exe PID: 7188, type: MEMORYSTR
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_001D018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread, 0_2_001D018D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject, 3_2_004CF280
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: richardflorespoew.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: strwawrunnygjwu.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: justifycanddidatewd.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: raiseboltskdlwpow.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: falseaudiencekd.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: pleasurenarrowsdla.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: feighminoritsjda.shop
Source: UD9d3d9BDMOjLcXwYzjP.exe, 0000001E.00000002.1869994246.0000000000478000.00000004.00000001.01000000.0000000B.sdmp String found in binary or memory: marathonbeedksow.shop
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000 Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000 Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000 Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000 Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: EE5008 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1068008 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: CFE008 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000 Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1305008 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42F000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 642000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: DC9008
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44F000
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: B05008
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42F000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 642000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 91B008
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42F000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 642000
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: FBC008
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44F000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 649008
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44F000
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 63E008
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process created: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe "C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: unknown unknown Jump to behavior
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\UD9d3d9BDMOjLcXwYzjP.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_22594e13276480dd456a8441babc227b\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: C:\ProgramData\MSIUpdaterV168_ba275140a7f982708edd6279b1a14d06\MSIUpdaterV168.exe Process created: unknown unknown
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3BB0C cpuid 0_2_00B3BB0C
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: EnumSystemLocalesW, 0_2_00B4C8B0
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetLocaleInfoW, 0_2_00B558F2
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 0_2_00B5505D
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 0_2_00B559C1
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: EnumSystemLocalesW, 0_2_00B552FF
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetLocaleInfoW, 0_2_00B55258
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: EnumSystemLocalesW, 0_2_00B553E5
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: EnumSystemLocalesW, 0_2_00B5534A
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 0_2_00B55470
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetLocaleInfoW, 0_2_00B4CD79
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetLocaleInfoW, 0_2_00B556C3
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 0_2_00B557EC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey, 3_2_004E06D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 3_2_00452B5A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW, 3_2_00452D5F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 3_2_00452E51
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 3_2_00452E06
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 3_2_00452EEC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 3_2_00452F77
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW, 3_2_004531CA
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 3_2_0044B1B1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 3_2_004532F3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW, 3_2_004533F9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 3_2_004534CF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW, 3_2_0044B734
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoEx,FormatMessageA, 3_2_00431D94
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 11_2_0005505D
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: EnumSystemLocalesW, 11_2_0004C8B0
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetLocaleInfoW, 11_2_000558F2
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 11_2_000559C1
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetLocaleInfoW, 11_2_00055258
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: EnumSystemLocalesW, 11_2_000552FF
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: EnumSystemLocalesW, 11_2_0005534A
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: EnumSystemLocalesW, 11_2_000553E5
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 11_2_00055470
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetLocaleInfoW, 11_2_0004CD79
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetLocaleInfoW, 11_2_000556C3
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\JNXEsB3lt_ta57yvH0nX.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 11_2_000557EC
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: EnumSystemLocalesW, 12_2_00A2C8B0
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetLocaleInfoW, 12_2_00A358F2
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 12_2_00A3505D
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 12_2_00A359C1
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: EnumSystemLocalesW, 12_2_00A352FF
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetLocaleInfoW, 12_2_00A35258
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: EnumSystemLocalesW, 12_2_00A353E5
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: EnumSystemLocalesW, 12_2_00A3534A
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 12_2_00A35470
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetLocaleInfoW, 12_2_00A2CD79
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetLocaleInfoW, 12_2_00A356C3
Source: C:\ProgramData\MSIUpdaterV168_bdca866007fb255201297d2a15a49513\MSIUpdaterV168.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 12_2_00A357EC
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetACP,IsValidCodePage,GetLocaleInfoW, 22_2_0076506D
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: EnumSystemLocalesW, 22_2_0075C8C0
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetLocaleInfoW, 22_2_00765902
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 22_2_007659D1
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetLocaleInfoW, 22_2_00765268
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: EnumSystemLocalesW, 22_2_0076535A
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: EnumSystemLocalesW, 22_2_0076530F
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: EnumSystemLocalesW, 22_2_007653F5
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 22_2_00765480
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetLocaleInfoW, 22_2_0075CD89
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetLocaleInfoW, 22_2_007656D3
Source: C:\Users\user\AppData\Local\Temp\span5OrBOMtvc8QO\EWDN0G9BRDazVJeatNlA.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 22_2_007657FC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW, 23_2_1B772112
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW, 23_2_1B772112
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 23_2_1B94FF17
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 23_2_1B963300
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 23_2_1B773AA3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 23_2_1B962DF9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 23_2_1B962D38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: EnumSystemLocalesW, 23_2_1B962CB6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree, 23_2_0041098E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\1kBeqS7E3z.exe Code function: 0_2_00B3BF33 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_00B3BF33
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey, 3_2_004E06D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_004E06D0 CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey, 3_2_004E06D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 3_2_00544C30 GetVersionExA,GetFileAttributesW,GetFileAttributesA, 3_2_00544C30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: Amcache.hve.6.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: RegAsm.exe, 00000017.00000002.4149119694.0000000001141000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
Source: Amcache.hve.6.dr Binary or memory string: MsMpEng.exe
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

Stealing of Sensitive Information

barindex
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\U4XS0oCaLxVS1ZKFaAUvhYs.zip, type: DROPPED
Source: Yara match File source: 22.2.EWDN0G9BRDazVJeatNlA.exe.740000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000022.00000002.1917031958.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000002.1855823531.0000000000778000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.1878372418.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: EWDN0G9BRDazVJeatNlA.exe PID: 7032, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 7124, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSIUpdaterV168.exe PID: 7176, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSIUpdaterV168.exe PID: 7188, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\places.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_blnieiiffboillknjnepogjhkgnoapac_0.indexeddb.leveldb\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_cjelfplplebdjjenllpjcblmjkfcffne_0.indexeddb.leveldb\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\signons.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\signons.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\formhistory.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\logins.json Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior

Remote Access Functionality

barindex
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: C:\Users\user\AppData\Local\Temp\U4XS0oCaLxVS1ZKFaAUvhYs.zip, type: DROPPED
Source: Yara match File source: 22.2.EWDN0G9BRDazVJeatNlA.exe.740000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 34.2.MSIUpdaterV168.exe.c00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000022.00000002.1917031958.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 00000016.00000002.1855823531.0000000000778000.00000004.00000001.01000000.00000009.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.1878372418.0000000000C38000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: EWDN0G9BRDazVJeatNlA.exe PID: 7032, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 7124, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSIUpdaterV168.exe PID: 7176, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: MSIUpdaterV168.exe PID: 7188, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7EDB10 sqlite3_initialize,sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free, 23_2_1B7EDB10
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B89D9E0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log, 23_2_1B89D9E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B815910 sqlite3_mprintf,sqlite3_bind_int64, 23_2_1B815910
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7F1FE0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B7F1FE0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7EDFC0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_mprintf,sqlite3_bind_text,sqlite3_step,sqlite3_reset, 23_2_1B7EDFC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B785C70 sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset, 23_2_1B785C70
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B82D3B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B82D3B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8151D0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B8151D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B809090 sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_errmsg,sqlite3_mprintf, 23_2_1B809090
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B84D610 sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B84D610
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8155B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B8155B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8914D0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log, 23_2_1B8914D0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B89D4F0 sqlite3_bind_value,sqlite3_log,sqlite3_log,sqlite3_log, 23_2_1B89D4F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B784820 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_initialize, 23_2_1B784820
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7A0FB0 sqlite3_result_int64,sqlite3_result_double,sqlite3_result_int,sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset, 23_2_1B7A0FB0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B854D40 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,InitOnceBeginInitialize,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free, 23_2_1B854D40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7E8200 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset, 23_2_1B7E8200
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7C06E0 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset, 23_2_1B7C06E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B798680 sqlite3_mprintf,sqlite3_mprintf,sqlite3_initialize,sqlite3_finalize,sqlite3_free,sqlite3_mprintf,sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_int64, 23_2_1B798680
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7C8550 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset, 23_2_1B7C8550
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B8537E0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B8537E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B833770 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B833770
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B79B400 sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,sqlite3_reset,sqlite3_step,sqlite3_reset,sqlite3_column_int64, 23_2_1B79B400
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7CEF30 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code, 23_2_1B7CEF30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7DE200 sqlite3_initialize,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset, 23_2_1B7DE200
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7EE170 sqlite3_bind_int64,sqlite3_step,sqlite3_reset, 23_2_1B7EE170
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7DE090 sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset, 23_2_1B7DE090
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7EA6F0 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value, 23_2_1B7EA6F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 23_2_1B7866C0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_bind_value,sqlite3_free,sqlite3_bind_value,sqlite3_step,sqlite3_reset, 23_2_1B7866C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs