Source: setup.exe |
ReversingLabs: Detection: 63% |
Source: setup.exe |
Virustotal: Detection: 73% |
Perma Link |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\Desktop\setup.exe |
File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.log |
Jump to behavior |
Source: setup.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: |
Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: C:\7jdz0h\obj\Release\Company.pdb source: setup.exe |
Source: Network traffic |
Suricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.7:49700 -> 193.233.132.253:50600 |
Source: Network traffic |
Suricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.7:49700 -> 193.233.132.253:50600 |
Source: global traffic |
TCP traffic: 192.168.2.7:49700 -> 193.233.132.253:50600 |
Source: Joe Sandbox View |
IP Address: 193.233.132.253 193.233.132.253 |
Source: Joe Sandbox View |
IP Address: 193.233.132.253 193.233.132.253 |
Source: Joe Sandbox View |
ASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004680A0 recv, |
3_2_004680A0 |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://www.winimage.com/zLibDll |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp |
String found in binary or memory: http://www.winimage.com/zLibDllDpRTpR |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp |
String found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll |
Source: RegAsm.exe, 00000003.00000002.3721877835.00000000015AA000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://t.me/RiseProSUPPORT |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\setup.exe |
Code function: 0_2_00A20B80 |
0_2_00A20B80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005EF006 |
3_2_005EF006 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0057900A |
3_2_0057900A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0054F0FB |
3_2_0054F0FB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0055014F |
3_2_0055014F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0054D12C |
3_2_0054D12C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005701F5 |
3_2_005701F5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004E925D |
3_2_004E925D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00487270 |
3_2_00487270 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005E2349 |
3_2_005E2349 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004E03D0 |
3_2_004E03D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005DC3B1 |
3_2_005DC3B1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00402400 |
3_2_00402400 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005AF4AC |
3_2_005AF4AC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00553508 |
3_2_00553508 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004E959F |
3_2_004E959F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00548676 |
3_2_00548676 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00402600 |
3_2_00402600 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00583614 |
3_2_00583614 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00563608 |
3_2_00563608 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0056D85D |
3_2_0056D85D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005DB831 |
3_2_005DB831 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005639D3 |
3_2_005639D3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005EFAD2 |
3_2_005EFAD2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004E5B90 |
3_2_004E5B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00418BB0 |
3_2_00418BB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005BDC4C |
3_2_005BDC4C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005D7D09 |
3_2_005D7D09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005D4E2F |
3_2_005D4E2F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_005E8EF4 |
3_2_005E8EF4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00483EF0 |
3_2_00483EF0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0059AEB8 |
3_2_0059AEB8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00550FB6 |
3_2_00550FB6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0057DFBA |
3_2_0057DFBA |
Source: setup.exe, 00000000.00000002.1256634562.00000000008C9000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs setup.exe |
Source: setup.exe, 00000000.00000000.1252913238.00000000002BC000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameCompany.exeJ vs setup.exe |
Source: setup.exe |
Binary or memory string: OriginalFilenameCompany.exeJ vs setup.exe |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@4/1@0/1 |
Source: C:\Users\user\Desktop\setup.exe |
File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.log |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2916:120:WilError_03 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
File created: C:\Users\user~1\AppData\Local\Temp\adobe9Ly9nVMaTKYM |
Jump to behavior |
Source: setup.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: setup.exe |
Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: C:\Users\user\Desktop\setup.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp |
Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp |
Binary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: setup.exe |
ReversingLabs: Detection: 63% |
Source: setup.exe |
Virustotal: Detection: 73% |
Source: unknown |
Process created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe" |
|
Source: C:\Users\user\Desktop\setup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\setup.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" |
|
Source: C:\Users\user\Desktop\setup.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: acgenral.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: samcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: msacm32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: winmmbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: winmmbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: aclayers.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: sfc.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: sfc_os.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: d3d11.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: dxgi.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: resourcepolicyclient.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: d3d10warp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: dxcore.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Section loaded: devobj.dll |
Jump to behavior |
Source: setup.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: setup.exe |
Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: setup.exe |
Static file information: File size 2265088 > 1048576 |
Source: setup.exe |
Static PE information: Raw size of .text is bigger than: 0x100000 < 0x228600 |
Source: setup.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: setup.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: |
Binary string: C:\7jdz0h\obj\Release\Company.pdb source: setup.exe |
Source: setup.exe |
Static PE information: 0x9484A554 [Wed Dec 16 08:44:04 2048 UTC] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00418BB0 LoadLibraryA,GetProcAddress, |
3_2_00418BB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004DD189 push ecx; ret |
3_2_004DD19C |
Source: C:\Users\user\Desktop\setup.exe |
File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.log |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Stalling execution: Execution stalls by calling Sleep |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
API/Special instruction interceptor: Address: 703BA7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
API/Special instruction interceptor: Address: 65B260 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
API/Special instruction interceptor: Address: 5FD48D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
API/Special instruction interceptor: Address: 61633D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
API/Special instruction interceptor: Address: 742DBD |
Source: C:\Users\user\Desktop\setup.exe |
Memory allocated: A20000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory allocated: 2650000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory allocated: 4650000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0054C04A rdtsc |
3_2_0054C04A |
Source: C:\Users\user\Desktop\setup.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Window / User API: threadDelayed 3163 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Window / User API: threadDelayed 5349 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Decision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec) |
Source: C:\Users\user\Desktop\setup.exe TID: 6752 |
Thread sleep time: -922337203685477s >= -30000s |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 |
Thread sleep count: 3163 > 30 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 |
Thread sleep time: -319463s >= -30000s |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7224 |
Thread sleep count: 350 > 30 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 |
Thread sleep count: 5349 > 30 |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 |
Thread sleep time: -540249s >= -30000s |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Last function: Thread delayed |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\setup.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: RegAsm.exe, 00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000& |
Source: RegAsm.exe, 00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: RegAsm.exe, 00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: RegAsm.exe, 00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_0054C04A rdtsc |
3_2_0054C04A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_00418BB0 LoadLibraryA,GetProcAddress, |
3_2_00418BB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Code function: 3_2_004146B0 mov eax, dword ptr fs:[00000030h] |
3_2_004146B0 |
Source: C:\Users\user\Desktop\setup.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Code function: 0_2_02652411 CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread, |
0_2_02652411 |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 515000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 540000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 545000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 5F6000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 5F7000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 81B000 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1091008 |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe |
Queries volume information: C:\Users\user\Desktop\setup.exe VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: Yara match |
File source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: Process Memory Space: RegAsm.exe PID: 6408, type: MEMORYSTR |
Source: Yara match |
File source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: Process Memory Space: RegAsm.exe PID: 6408, type: MEMORYSTR |