Click to jump to signature section
Source: setup.exe | ReversingLabs: Detection: 63% |
Source: setup.exe | Virustotal: Detection: 73% | Perma Link |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\Desktop\setup.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.log | Jump to behavior |
Source: setup.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: | Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\7jdz0h\obj\Release\Company.pdb source: setup.exe |
Source: Network traffic | Suricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.7:49700 -> 193.233.132.253:50600 |
Source: Network traffic | Suricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.7:49700 -> 193.233.132.253:50600 |
Source: global traffic | TCP traffic: 192.168.2.7:49700 -> 193.233.132.253:50600 |
Source: Joe Sandbox View | IP Address: 193.233.132.253 193.233.132.253 |
Source: Joe Sandbox View | IP Address: 193.233.132.253 193.233.132.253 |
Source: Joe Sandbox View | ASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU |
Source: unknown | TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown | TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown | TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown | TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: unknown | TCP traffic detected without corresponding DNS query: 193.233.132.253 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004680A0 recv, | 3_2_004680A0 |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp | String found in binary or memory: http://www.winimage.com/zLibDll |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp | String found in binary or memory: http://www.winimage.com/zLibDllDpRTpR |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll |
Source: RegAsm.exe, 00000003.00000002.3721877835.00000000015AA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t.me/RiseProSUPPORT |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Process Stats: CPU usage > 49% |
Source: C:\Users\user\Desktop\setup.exe | Code function: 0_2_00A20B80 | 0_2_00A20B80 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005EF006 | 3_2_005EF006 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0057900A | 3_2_0057900A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0054F0FB | 3_2_0054F0FB |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0055014F | 3_2_0055014F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0054D12C | 3_2_0054D12C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005701F5 | 3_2_005701F5 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004E925D | 3_2_004E925D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00487270 | 3_2_00487270 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005E2349 | 3_2_005E2349 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004E03D0 | 3_2_004E03D0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005DC3B1 | 3_2_005DC3B1 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00402400 | 3_2_00402400 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005AF4AC | 3_2_005AF4AC |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00553508 | 3_2_00553508 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004E959F | 3_2_004E959F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00548676 | 3_2_00548676 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00402600 | 3_2_00402600 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00583614 | 3_2_00583614 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00563608 | 3_2_00563608 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0056D85D | 3_2_0056D85D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005DB831 | 3_2_005DB831 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005639D3 | 3_2_005639D3 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005EFAD2 | 3_2_005EFAD2 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004E5B90 | 3_2_004E5B90 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00418BB0 | 3_2_00418BB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005BDC4C | 3_2_005BDC4C |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005D7D09 | 3_2_005D7D09 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005D4E2F | 3_2_005D4E2F |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_005E8EF4 | 3_2_005E8EF4 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00483EF0 | 3_2_00483EF0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0059AEB8 | 3_2_0059AEB8 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00550FB6 | 3_2_00550FB6 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0057DFBA | 3_2_0057DFBA |
Source: setup.exe, 00000000.00000002.1256634562.00000000008C9000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs setup.exe |
Source: setup.exe, 00000000.00000000.1252913238.00000000002BC000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameCompany.exeJ vs setup.exe |
Source: setup.exe | Binary or memory string: OriginalFilenameCompany.exeJ vs setup.exe |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@4/1@0/1 |
Source: C:\Users\user\Desktop\setup.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Mutant created: NULL |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2916:120:WilError_03 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | File created: C:\Users\user~1\AppData\Local\Temp\adobe9Ly9nVMaTKYM | Jump to behavior |
Source: setup.exe | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: setup.exe | Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83% |
Source: C:\Users\user\Desktop\setup.exe | Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp | Binary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q); |
Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp | Binary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger'); |
Source: setup.exe | ReversingLabs: Detection: 63% |
Source: setup.exe | Virustotal: Detection: 73% |
Source: unknown | Process created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe" | |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: acgenral.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: samcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: msacm32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: winmmbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: aclayers.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sfc.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: sfc_os.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Section loaded: devobj.dll | Jump to behavior |
Source: setup.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: setup.exe | Static PE information: Virtual size of .text is bigger than: 0x100000 |
Source: setup.exe | Static file information: File size 2265088 > 1048576 |
Source: setup.exe | Static PE information: Raw size of .text is bigger than: 0x100000 < 0x228600 |
Source: setup.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: setup.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp |
Source: | Binary string: C:\7jdz0h\obj\Release\Company.pdb source: setup.exe |
Source: setup.exe | Static PE information: 0x9484A554 [Wed Dec 16 08:44:04 2048 UTC] |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00418BB0 LoadLibraryA,GetProcAddress, | 3_2_00418BB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004DD189 push ecx; ret | 3_2_004DD19C |
Source: C:\Users\user\Desktop\setup.exe | File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.log | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Stalling execution: Execution stalls by calling Sleep | graph_3-23553 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | API/Special instruction interceptor: Address: 703BA7 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | API/Special instruction interceptor: Address: 65B260 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | API/Special instruction interceptor: Address: 5FD48D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | API/Special instruction interceptor: Address: 61633D |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | API/Special instruction interceptor: Address: 742DBD |
Source: C:\Users\user\Desktop\setup.exe | Memory allocated: A20000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory allocated: 2650000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory allocated: 4650000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0054C04A rdtsc | 3_2_0054C04A |
Source: C:\Users\user\Desktop\setup.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Window / User API: threadDelayed 3163 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Window / User API: threadDelayed 5349 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Decision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec) | graph_3-23558 |
Source: C:\Users\user\Desktop\setup.exe TID: 6752 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 | Thread sleep count: 3163 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 | Thread sleep time: -319463s >= -30000s | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7224 | Thread sleep count: 350 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 | Thread sleep count: 5349 > 30 | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396 | Thread sleep time: -540249s >= -30000s | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Last function: Thread delayed |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Last function: Thread delayed |
Source: C:\Users\user\Desktop\setup.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: RegAsm.exe, 00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000& |
Source: RegAsm.exe, 00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: RegAsm.exe, 00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} |
Source: RegAsm.exe, 00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_0054C04A rdtsc | 3_2_0054C04A |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_00418BB0 LoadLibraryA,GetProcAddress, | 3_2_00418BB0 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Code function: 3_2_004146B0 mov eax, dword ptr fs:[00000030h] | 3_2_004146B0 |
Source: C:\Users\user\Desktop\setup.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Code function: 0_2_02652411 CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread, | 0_2_02652411 |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 515000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 540000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 545000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 5F6000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 5F7000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 81B000 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1091008 | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | Jump to behavior |
Source: C:\Users\user\Desktop\setup.exe | Queries volume information: C:\Users\user\Desktop\setup.exe VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Queries volume information: C:\ VolumeInformation | Jump to behavior |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: Yara match | File source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: Process Memory Space: RegAsm.exe PID: 6408, type: MEMORYSTR |
Source: Yara match | File source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: Process Memory Space: RegAsm.exe PID: 6408, type: MEMORYSTR |