Windows Analysis Report
08(2)_00.exe

Overview

General Information

Sample name: 08(2)_00.exe
renamed because original name is a hash value
Original sample name: ---RFQ_1282-2023.03.08(2)_00.exe
Analysis ID: 1524791
MD5: 4fdf9741c120f25e66ba4cf07067c5d5
SHA1: 7edfe85c45ead131f31f158c6c4ba2ef5f6291c8
SHA256: 3702d77895124b57140bce0482029875be25274a2c30ec6d8fac8bbdfcd92394
Tags: exeuser-abuse_ch
Infos:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
.NET source code contains potential unpacker
AI detected suspicious sample
Contains functionality to register a low level keyboard hook
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
Agent Tesla, AgentTesla A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla

AV Detection

barindex
Source: 0.2.08(2)_00.exe.43f0218.3.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendMessage?chat_id=5928888099"}
Source: RegAsm.exe.3508.2.memstrmin Malware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendMessage"}
Source: https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/ Virustotal: Detection: 5% Perma Link
Source: 08(2)_00.exe ReversingLabs: Detection: 75%
Source: 08(2)_00.exe Virustotal: Detection: 70% Perma Link
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: 08(2)_00.exe Joe Sandbox ML: detected
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: /log.tmp
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: text/html
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: text/html
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>[
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: yyyy-MM-dd HH:mm:ss
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ]<br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: text/html
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: application/zip
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Time:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: MM/dd/yyyy HH:mm:ss
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>User Name:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>Computer Name:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>OSFullName:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>CPU:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>RAM:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IP Address:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <hr>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: New
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: MM/dd/yyyy HH:mm:ss
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IP Address:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: https://api.ipify.org
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: false
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 5928888099
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: true
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: false
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: appdata
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: fOLFRQq
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: fOLFRQq.exe
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: fOLFRQq
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Type
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Microsoft\Windows\CurrentVersion\Run
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <hr>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <b>[
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ]</b> (
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: )<br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {BACK}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {ALT+TAB}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {ALT+F4}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {TAB}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {ESC}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {Win}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {CAPSLOCK}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {KEYUP}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {KEYDOWN}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {KEYLEFT}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {KEYRIGHT}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {DEL}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {END}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {HOME}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {Insert}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {NumLock}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {PageDown}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {PageUp}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {ENTER}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F1}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F2}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F3}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F4}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F5}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F6}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F7}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F8}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F9}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F10}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F11}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {F12}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: control
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {CTRL}
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: &amp;
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: &lt;
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: &gt;
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: &quot;
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <br><hr>Copied Text: <br>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <hr>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: logins
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IE/Edge
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Secure Note
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Web Password Credential
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Credential Picker Protector
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Web Credentials
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Credentials
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Domain Certificate Credential
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Domain Password Credential
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Extended Credential
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 00000000-0000-0000-0000-000000000000
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SchemaId
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pResourceElement
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pIdentityElement
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pPackageSid
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pAuthenticatorElement
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IE/Edge
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UC Browser
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UCBrowser\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Login Data
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: journal
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: wow_logins
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Safari for Windows
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Apple Computer\Preferences\keychain.plist
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <array>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <dict>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <string>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </string>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <string>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </string>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <data>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </data>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: -convert xml1 -s -o "
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \fixed_keychain.xml"
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Microsoft\Credentials\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Microsoft\Credentials\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Microsoft\Credentials\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Microsoft\Credentials\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Microsoft\Protect\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: credential
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: QQ Browser
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Tencent\QQBrowser\User Data
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Default\EncryptedStorage
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Profile
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \EncryptedStorage
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: entries
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: category
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: str3
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: str2
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: blob0
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: password_value
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IncrediMail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PopPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SmtpPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\IncrediMail\Identities\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Accounts_New
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PopPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SmtpPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SmtpServer
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: EmailAddress
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Eudora
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Qualcomm\Eudora\CommandLine\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: current
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Settings
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SavePasswordText
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Settings
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ReturnAddress
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Falkon Browser
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \falkon\profiles\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: profiles.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: startProfile=([A-z0-9\/\.\"]+)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: profiles.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \browsedata.db
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: autofill
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ClawsMail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Claws-mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \clawsrc
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \clawsrc
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passkey0
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: master_passphrase_salt=(.+)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: master_passphrase_pbkdf2_rounds=(.+)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \accountrc
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: smtp_server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: address
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: account
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \passwordstorerc
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: {(.*),(.*)}(.*)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Flock Browser
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: APPDATA
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Flock\Browser\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: signons3.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: DynDns
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ALLUSERSPROFILE
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Dyn\Updater\config.dyndns
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: username=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: password=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: https://account.dyn.com/
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: t6KzXhCh
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ALLUSERSPROFILE
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Dyn\Updater\daemon.cfg
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: global
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: accounts
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: account.
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: username
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: account.
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Psi/Psi+
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: name
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Psi/Psi+
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: APPDATA
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Psi\profiles
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: APPDATA
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Psi+\profiles
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \accounts.xml
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \accounts.xml
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: OpenVPN
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\OpenVPN-GUI\configs
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\OpenVPN-GUI\configs
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\OpenVPN-GUI\configs\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: username
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: auth-data
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: entropy
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: USERPROFILE
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \OpenVPN\config\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: remote
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: remote
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: NordVPN
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: NordVPN
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: NordVpn.exe*
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: user.config
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: //setting[@name='Username']/value
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: //setting[@name='Password']/value
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: NordVPN
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Private Internet Access
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: %ProgramW6432%
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Private Internet Access\data
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles(x86)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Private Internet Access\data
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \account.json
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: .*"username":"(.*?)"
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: .*"password":"(.*?)"
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Private Internet Access
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: privateinternetaccess.com
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FileZilla
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: APPDATA
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \FileZilla\recentservers.xml
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: APPDATA
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \FileZilla\recentservers.xml
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Server>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Host>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Host>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </Host>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Port>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </Port>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <User>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <User>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </User>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Pass encoding="base64">
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Pass encoding="base64">
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </Pass>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Pass>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <Pass encoding="base64">
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </Pass>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: CoreFTP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SOFTWARE\FTPWare\COREFTP\Sites
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: User
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Host
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Port
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: hdfzpysvpzimorhk
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: WinSCP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HostName
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UserName
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PublicKeyFile
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PortNumber
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: [PRIVATE KEY LOCATION: "{0}"]
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: WinSCP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ABCDEF
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Flash FXP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: port
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: user
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pass
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: quick.dat
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Sites.dat
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \FlashFXP\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \FlashFXP\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FTP Navigator
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SystemDrive
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \FTP Navigator\Ftplist.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: No Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: User
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SmartFTP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: APPDATA
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: WS_FTP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: appdata
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HOST
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PWD=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PWD=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FtpCommander
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SystemDrive
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SystemDrive
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SystemDrive
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \cftp\Ftplist.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;Password=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;User=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;Server=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;Port=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;Port=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;Password=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;User=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ;Anonymous=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FTPGetter
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \FTPGetter\servers.xml
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_ip>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_ip>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </server_ip>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_port>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </server_port>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_user_name>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_user_name>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </server_user_name>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_user_password>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: <server_user_password>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: </server_user_password>
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FTPGetter
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: The Bat!
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: appdata
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \The Bat!
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Account.CFN
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Account.CFN
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Becky!
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: DataDir
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Folder.lst
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Mailbox.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Account
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PassWd
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Account
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SMTPServer
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Account
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: MailAddress
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Becky!
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Outlook
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IMAP Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: POP3 Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HTTP Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SMTP Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IMAP Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: POP3 Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HTTP Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SMTP Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Windows Mail App
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\Microsoft\ActiveSync\Partners
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SchemaId
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pResourceElement
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pIdentityElement
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pPackageSid
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: pAuthenticatorElement
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: syncpassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: mailoutgoing
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FoxMail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Executable
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: FoxmailPath
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Storage\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Storage\
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \VirtualStore\Program Files\Foxmail\mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \VirtualStore\Program Files\Foxmail\mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Accounts\Account.rec0
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Accounts\Account.rec0
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Account.stg
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Account.stg
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: POP3Host
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SMTPHost
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: IncomingServer
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Account
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: MailAddress
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: POP3Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Opera Mail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Opera Mail\Opera Mail\wand.dat
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Opera Mail\Opera Mail\wand.dat
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: opera:
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PocoMail
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: appdata
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Pocomail\accounts.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: POPPass
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SMTPPass
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SMTP
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: eM Client
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: eM Client\accounts.dat
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: eM Client
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Accounts
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: "Username":"
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: "Secret":"
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: "ProviderName":"
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: o6806642kbM7c5
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Mailbird
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SenderIdentities
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Accounts
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \Mailbird\Store\Store.db
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Server_Host
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Accounts
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Email
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Username
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: EncryptedPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Mailbird
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: RealVNC 4.x
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: RealVNC 3.x
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SOFTWARE\RealVNC\vncserver
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: RealVNC 4.x
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: SOFTWARE\RealVNC\WinVNC4
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: RealVNC 3.x
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\ORL\WinVNC3
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: TightVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\TightVNC\Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: TightVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\TightVNC\Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: PasswordViewOnly
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: TightVNC ControlPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\TightVNC\Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ControlPassword
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: TigerVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Software\TigerVNC\Server
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: Password
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles(x86)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles(x86)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd2
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd2
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd2
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles(x86)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: UltraVNC
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: ProgramFiles(x86)
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: \UltraVNC\ultravnc.ini
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: passwd2
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: JDownloader 2.0
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: JDownloader 2.0\cfg
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: JDownloader 2.0\cfg
Source: 0.2.08(2)_00.exe.43f0218.3.unpack String decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
Source: 08(2)_00.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49715 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49717 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49726 version: TLS 1.2
Source: 08(2)_00.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Desktop V500\important\CSharp-RunPE-master\RunPE\obj\Debug\SeaCyanPul.pdb source: 08(2)_00.exe, 00000000.00000002.1433779096.0000000005B90000.00000004.08000000.00040000.00000000.sdmp, 08(2)_00.exe, 00000000.00000002.1432087935.0000000003311000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: RegAsm.pdb source: fOLFRQq.exe, 00000003.00000000.1540965758.00000000003D2000.00000002.00000001.01000000.00000007.sdmp, fOLFRQq.exe.2.dr
Source: Binary string: RegAsm.pdb4 source: fOLFRQq.exe, 00000003.00000000.1540965758.00000000003D2000.00000002.00000001.01000000.00000007.sdmp, fOLFRQq.exe.2.dr

Networking

barindex
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49717 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49720 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49706 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49722 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49718 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.8:49705 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49705 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49724 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49721 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49715 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49727 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49716 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49725 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49723 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49726 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49719 -> 149.154.167.220:443
Source: Network traffic Suricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.8:49728 -> 149.154.167.220:443
Source: unknown DNS query: name: api.telegram.org
Source: unknown DNS query: name: api.telegram.org
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dce3703dfdeaedHost: api.telegram.orgContent-Length: 969Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dce37f98649edfHost: api.telegram.orgContent-Length: 4055Expect: 100-continue
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dcf63dc95ed8bcHost: api.telegram.orgContent-Length: 66189Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dcfcf98fda5bd4Host: api.telegram.orgContent-Length: 66189Expect: 100-continue
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dcff9d314df993Host: api.telegram.orgContent-Length: 66189Expect: 100-continue
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd02a807c14747Host: api.telegram.orgContent-Length: 71082Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd06261abaf81bHost: api.telegram.orgContent-Length: 66189Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd09fe14711de6Host: api.telegram.orgContent-Length: 66189Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd0c4dd95d112bHost: api.telegram.orgContent-Length: 66189Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd1d119704835bHost: api.telegram.orgContent-Length: 66210Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd220c2c8aed8dHost: api.telegram.orgContent-Length: 66210Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd2451751cb897Host: api.telegram.orgContent-Length: 66210Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd29f77b37b2d9Host: api.telegram.orgContent-Length: 69214Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd2dbcb9f7e0c6Host: api.telegram.orgContent-Length: 66210Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd36acca76dd4aHost: api.telegram.orgContent-Length: 66183Expect: 100-continueConnection: Keep-Alive
Source: global traffic HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dce35a771aea67Host: api.telegram.orgContent-Length: 66183Expect: 100-continueConnection: Keep-Alive
Source: Joe Sandbox View IP Address: 149.154.167.220 149.154.167.220
Source: Joe Sandbox View IP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox View ASN Name: TELEGRAMRU TELEGRAMRU
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View JA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknown DNS query: name: api.ipify.org
Source: unknown DNS query: name: api.ipify.org
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: api.ipify.org
Source: global traffic DNS traffic detected: DNS query: api.telegram.org
Source: unknown HTTP traffic detected: POST /bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dce3703dfdeaedHost: api.telegram.orgContent-Length: 969Expect: 100-continueConnection: Keep-Alive
Source: RegAsm.exe, 00000002.00000002.3869447768.000000000332E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000032FC000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003447000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003201000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000031FB000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003500000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://api.telegram.org
Source: RegAsm.exe, 00000002.00000002.3869447768.00000000030B1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: RegAsm.exe, 00000002.00000002.3869447768.00000000030B1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.ipify.org
Source: RegAsm.exe, 00000002.00000002.3869447768.0000000003500000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.telegram
Source: RegAsm.exe, 00000002.00000002.3869447768.0000000003287000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.000000000332E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000032FC000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003447000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003201000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000031FB000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003500000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.telegram.org
Source: RegAsm.exe, 00000002.00000002.3869447768.00000000030B1000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/
Source: RegAsm.exe, 00000002.00000002.3869447768.0000000003287000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.000000000332E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000032FC000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003447000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003201000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000031FB000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3869447768.0000000003500000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.telegram.org/bot5556229164:AAG06WuQ2Ibcy5ZKb4lTSDlmionK0lTPWiM/sendDocument
Source: RegAsm.exe, 00000002.00000002.3869447768.00000000032FC000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://api.telegram.orgLJK
Source: 08(2)_00.exe String found in binary or memory: https://github.com/WindOfNet/CgLogListener
Source: 08(2)_00.exe String found in binary or memory: https://notify-api.line.me/api/notify
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49725 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49725
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown HTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49704 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49715 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49717 version: TLS 1.2
Source: unknown HTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.8:49726 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_06FA8F38 SetWindowsHookExA 0000000D,00000000,?,?,?,?,?,?,?,?,?,06FABC68,00000000,00000000 2_2_06FA8F38
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Windows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0737A410 GetKeyState,GetKeyState,GetKeyState, 2_2_0737A410
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0737A400 GetKeyState,GetKeyState,GetKeyState, 2_2_0737A400
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014A4128 2_2_014A4128
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014A4470 2_2_014A4470
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014A4D40 2_2_014A4D40
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014AB3F0 2_2_014AB3F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014AB264 2_2_014AB264
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014AC9F0 2_2_014AC9F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014AB3E0 2_2_014AB3E0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_014AB258 2_2_014AB258
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_05542D58 2_2_05542D58
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_05542D68 2_2_05542D68
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_06FA4908 2_2_06FA4908
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_06FA9808 2_2_06FA9808
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07308498 2_2_07308498
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0730E300 2_2_0730E300
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07309388 2_2_07309388
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0730B997 2_2_0730B997
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0730C9F0 2_2_0730C9F0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07305ECC 2_2_07305ECC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07302BA8 2_2_07302BA8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0730C123 2_2_0730C123
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0737BD01 2_2_0737BD01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07372470 2_2_07372470
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07377968 2_2_07377968
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07373840 2_2_07373840
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07375E00 2_2_07375E00
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0737CE78 2_2_0737CE78
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_0737E658 2_2_0737E658
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_073765AA 2_2_073765AA
Source: 08(2)_00.exe, 00000000.00000002.1433779096.0000000005B90000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameSeaCyanPul.dll" vs 08(2)_00.exe
Source: 08(2)_00.exe, 00000000.00000002.1432692321.0000000004319000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameDataBasePracticalJob.dllJ vs 08(2)_00.exe
Source: 08(2)_00.exe, 00000000.00000002.1432692321.0000000004319000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamec46a0699-d7ba-42cc-b530-9ae8abb85ed8.exe4 vs 08(2)_00.exe
Source: 08(2)_00.exe, 00000000.00000002.1433934439.0000000005D40000.00000004.08000000.00040000.00000000.sdmp Binary or memory string: OriginalFilenameDataBasePracticalJob.dllJ vs 08(2)_00.exe
Source: 08(2)_00.exe, 00000000.00000002.1426927656.00000000014DE000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameclr.dllT vs 08(2)_00.exe
Source: 08(2)_00.exe, 00000000.00000002.1432087935.0000000003311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenameSeaCyanPul.dll" vs 08(2)_00.exe
Source: 08(2)_00.exe, 00000000.00000002.1432087935.0000000003311000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: OriginalFilenamec46a0699-d7ba-42cc-b530-9ae8abb85ed8.exe4 vs 08(2)_00.exe
Source: 08(2)_00.exe Binary or memory string: OriginalFilenameCgLogListener.exe6 vs 08(2)_00.exe
Source: 08(2)_00.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 08(2)_00.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.2.08(2)_00.exe.5d40000.6.raw.unpack, Review.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.5d40000.6.raw.unpack, Human.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.33bccac.1.raw.unpack, vrQBCQEUkZhMBwkZOZJQvLwhJxnADLpQChAphAJZfsMfxEiQLivpkxrTwsUwEkZMph.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.5b90000.5.raw.unpack, vrQBCQEUkZhMBwkZOZJQvLwhJxnADLpQChAphAJZfsMfxEiQLivpkxrTwsUwEkZMph.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.33b966c.0.raw.unpack, vrQBCQEUkZhMBwkZOZJQvLwhJxnADLpQChAphAJZfsMfxEiQLivpkxrTwsUwEkZMph.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.43f0218.3.raw.unpack, P.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.43f0218.3.raw.unpack, P.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 0.2.08(2)_00.exe.43f0218.3.raw.unpack, P.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.43f0218.3.raw.unpack, P.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.2.08(2)_00.exe.5d40000.6.raw.unpack, DataBase.cs Base64 encoded string: 'qDaFFYtxYdq4nZAfnvmArbTfOlJk8eAbgeD/unTuRE/KuleUoenxuvQ8YSzm0A5a7l5o7RrKkCON9Cjw94kq9Dy+8n7fqBmlHdwaeeYjtO1vP+8Hiiuwu8Csk0RKAROzRB3VqawswawNM+iprq5DrYr8lFqrmgTXUN9c46Su4L0RGnC7u2FUZ0b+fbhHuoh2'
Source: 0.2.08(2)_00.exe.435a978.2.raw.unpack, DataBase.cs Base64 encoded string: 'qDaFFYtxYdq4nZAfnvmArbTfOlJk8eAbgeD/unTuRE/KuleUoenxuvQ8YSzm0A5a7l5o7RrKkCON9Cjw94kq9Dy+8n7fqBmlHdwaeeYjtO1vP+8Hiiuwu8Csk0RKAROzRB3VqawswawNM+iprq5DrYr8lFqrmgTXUN9c46Su4L0RGnC7u2FUZ0b+fbhHuoh2'
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@7/8@3/2
Source: C:\Users\user\Desktop\08(2)_00.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\08(2)_00.exe.log Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5316:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3324:120:WilError_03
Source: 08(2)_00.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 08(2)_00.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: 08(2)_00.exe ReversingLabs: Detection: 75%
Source: 08(2)_00.exe Virustotal: Detection: 70%
Source: unknown Process created: C:\Users\user\Desktop\08(2)_00.exe "C:\Users\user\Desktop\08(2)_00.exe"
Source: C:\Users\user\Desktop\08(2)_00.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
Source: unknown Process created: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe "C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe"
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe "C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe"
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\08(2)_00.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: secur32.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe File opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: 08(2)_00.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 08(2)_00.exe Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Desktop V500\important\CSharp-RunPE-master\RunPE\obj\Debug\SeaCyanPul.pdb source: 08(2)_00.exe, 00000000.00000002.1433779096.0000000005B90000.00000004.08000000.00040000.00000000.sdmp, 08(2)_00.exe, 00000000.00000002.1432087935.0000000003311000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: RegAsm.pdb source: fOLFRQq.exe, 00000003.00000000.1540965758.00000000003D2000.00000002.00000001.01000000.00000007.sdmp, fOLFRQq.exe.2.dr
Source: Binary string: RegAsm.pdb4 source: fOLFRQq.exe, 00000003.00000000.1540965758.00000000003D2000.00000002.00000001.01000000.00000007.sdmp, fOLFRQq.exe.2.dr

Data Obfuscation

barindex
Source: 08(2)_00.exe, FormMain.cs .Net Code: ANTR3ND0 System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\08(2)_00.exe Code function: 0_2_032A96B2 push eax; iretd 0_2_032A96B9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_06FADA50 push es; ret 2_2_06FADA60
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Code function: 2_2_07306391 push es; ret 2_2_073063A0
Source: 08(2)_00.exe Static PE information: section name: .text entropy: 7.926510501369591
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File created: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fOLFRQq Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Registry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fOLFRQq Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: Yara match File source: Process Memory Space: 08(2)_00.exe PID: 5992, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\Desktop\08(2)_00.exe Memory allocated: 32A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Memory allocated: 3310000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Memory allocated: 5310000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 14A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 30B0000 memory reserve | memory write watch Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Memory allocated: 2EC0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Memory allocated: D30000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Memory allocated: 2670000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Memory allocated: 4670000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Memory allocated: 1780000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Memory allocated: 32A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Memory allocated: 3110000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1200000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199873 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199766 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199653 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199547 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199424 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199285 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199156 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199047 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599846 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599723 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599518 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599391 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599266 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599141 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599031 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598922 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598812 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598703 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598594 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598484 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598375 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598266 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598141 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598016 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597906 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597797 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597687 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597577 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597446 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597343 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597234 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597125 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597011 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596905 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596794 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596688 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596578 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596469 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596344 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596234 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596125 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596016 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 595906 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 595797 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 595687 Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 2573 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Window / User API: threadDelayed 7255 Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe TID: 6344 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -32281802128991695s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1200000s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199873s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199766s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199653s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199547s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199424s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199285s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199156s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -1199047s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -600000s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599846s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599723s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599518s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599391s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599266s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599141s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -599031s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598922s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598812s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598703s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598594s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598484s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598375s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598266s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598141s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -598016s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597906s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597797s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597687s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597577s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597446s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597343s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597234s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597125s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -597011s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596905s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596794s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596688s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596578s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596469s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596344s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596234s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596125s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -596016s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -595906s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -595797s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6264 Thread sleep time: -595687s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe TID: 2056 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe TID: 4128 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\08(2)_00.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1200000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199873 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199766 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199653 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199547 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199424 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199285 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199156 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 1199047 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599846 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599723 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599518 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599391 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599266 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599141 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 599031 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598922 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598812 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598703 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598594 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598484 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598375 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598266 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598141 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 598016 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597906 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597797 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597687 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597577 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597446 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597343 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597234 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597125 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 597011 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596905 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596794 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596688 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596578 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596469 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596344 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596234 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596125 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 596016 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 595906 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 595797 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Thread delayed: delay time: 595687 Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: RegAsm.exe, 00000002.00000002.3874265033.0000000006342000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll+
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" Jump to behavior
Source: RegAsm.exe, 00000002.00000002.3869447768.000000000310F000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: Program Manager
Source: C:\Users\user\Desktop\08(2)_00.exe Queries volume information: C:\Users\user\Desktop\08(2)_00.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Queries volume information: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe Queries volume information: C:\Users\user\AppData\Roaming\fOLFRQq\fOLFRQq.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\08(2)_00.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 0.2.08(2)_00.exe.43f0218.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.43c61e8.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.43f0218.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.43c61e8.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.435a978.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.3868083116.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1432692321.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 00000002.00000002.3869447768.00000000030E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 3508, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 3508, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\FTP Navigator\Ftplist.txt Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: Yara match File source: 00000002.00000002.3869447768.00000000030E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 3508, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 0.2.08(2)_00.exe.43f0218.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.43c61e8.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.43f0218.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.43c61e8.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.08(2)_00.exe.435a978.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000002.00000002.3868083116.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1432692321.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: 00000002.00000002.3869447768.00000000030E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 3508, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: RegAsm.exe PID: 3508, type: MEMORYSTR
Source: Yara match File source: decrypted.memstr, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs