Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rise2406.exe

Overview

General Information

Sample name:rise2406.exe
Analysis ID:1462857
MD5:c6c9f27d335d4e47b5ea12653e806be6
SHA1:e53242d463e2c94383ec646e7e04504b96b4d176
SHA256:514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • rise2406.exe (PID: 3180 cmdline: "C:\Users\user\Desktop\rise2406.exe" MD5: C6C9F27D335D4E47B5EA12653E806BE6)
    • conhost.exe (PID: 1456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 2520 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 2516 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 2700 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegAsm.exe PID: 2516JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    No Sigma rule has matched
    Timestamp:06/26/24-08:59:32.465846
    SID:2046267
    Source Port:50500
    Destination Port:49701
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/26/24-08:59:36.929586
    SID:2046269
    Source Port:49701
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/26/24-08:57:45.307172
    SID:2049060
    Source Port:49701
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:06/26/24-08:57:45.857539
    SID:2046266
    Source Port:50500
    Destination Port:49701
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: rise2406.exeReversingLabs: Detection: 87%
    Source: rise2406.exeVirustotal: Detection: 78%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: rise2406.exeJoe Sandbox ML: detected
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6B00 CryptUnprotectData,CryptUnprotectData,LocalFree,LocalFree,4_2_004C6B00
    Source: rise2406.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.7:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.7:49721 version: TLS 1.2
    Source: rise2406.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053C8CD FindFirstFileExW,0_2_0053C8CD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004C6000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00432022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,4_2_00432022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E6770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,4_2_004E6770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004938D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B60 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,CredEnumerateA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,lstrlenA,4_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044FC2F FindFirstFileExW,4_2_0044FC2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00431F9C FindClose,FindFirstFileExW,GetLastError,4_2_00431F9C

    Networking

    barindex
    Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.7:49701 -> 5.42.67.8:50500
    Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.67.8:50500 -> 192.168.2.7:49701
    Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.7:49701 -> 5.42.67.8:50500
    Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 5.42.67.8:50500 -> 192.168.2.7:49701
    Source: global trafficTCP traffic: 192.168.2.7:49701 -> 5.42.67.8:50500
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
    Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
    Source: Joe Sandbox ViewIP Address: 172.67.75.166 172.67.75.166
    Source: Joe Sandbox ViewIP Address: 5.42.67.8 5.42.67.8
    Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: unknownDNS query: name: ipinfo.io
    Source: unknownDNS query: name: ipinfo.io
    Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
    Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.67.8
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409280 recv,GetProcAddress,GetModuleHandleA,GetProcAddress,WSASend,4_2_00409280
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.33 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
    Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.33 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
    Source: global trafficDNS traffic detected: DNS query: ipinfo.io
    Source: global trafficDNS traffic detected: DNS query: db-ip.com
    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.33
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.33J
    Source: RegAsm.exe, RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000D88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/q
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D5A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000D96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.33:
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.33
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000D5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
    Source: RegAsm.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.7:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.75.166:443 -> 192.168.2.7:49721 version: TLS 1.2
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_005409FC0_2_005409FC
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00532C200_2_00532C20
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053BC920_2_0053BC92
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00540DD40_2_00540DD4
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052FF040_2_0052FF04
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_005377820_2_00537782
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E4BD04_2_004E4BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044002D4_2_0044002D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005220D04_2_005220D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F60E04_2_004F60E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004D70F04_2_004D70F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004930804_2_00493080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EE1704_2_004EE170
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005081204_2_00508120
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004371A04_2_004371A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005031A04_2_005031A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005122604_2_00512260
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0040A2C04_2_0040A2C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0050A2B04_2_0050A2B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044036F4_2_0044036F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004A43204_2_004A4320
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004904404_2_00490440
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F04504_2_004F0450
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DE4304_2_004DE430
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FA4804_2_004FA480
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005145504_2_00514550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0053F5504_2_0053F550
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F85F04_2_004F85F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0042F5804_2_0042F580
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0048F5904_2_0048F590
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004526104_2_00452610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004A36104_2_004A3610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005486C04_2_005486C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005477604_2_00547760
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F77304_2_004F7730
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E77E04_2_004E77E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005397B04_2_005397B0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004547BF4_2_004547BF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F28204_2_004F2820
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043C9604_2_0043C960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005469704_2_00546970
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F79604_2_004F7960
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043A9284_2_0043A928
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FA9304_2_004FA930
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EF9A04_2_004EF9A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044DA864_2_0044DA86
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F8B404_2_004F8B40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B604_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0051DBB04_2_0051DBB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00500BA04_2_00500BA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00458BB04_2_00458BB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EFC404_2_004EFC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EEC404_2_004EEC40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F7C004_2_004F7C00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00503CC04_2_00503CC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00409C904_2_00409C90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00534D404_2_00534D40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F9D704_2_004F9D70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F7D004_2_004F7D00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FAD004_2_004FAD00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00546D204_2_00546D20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00545DE04_2_00545DE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0053AE204_2_0053AE20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00458E304_2_00458E30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00506EA04_2_00506EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00516EA04_2_00516EA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF004_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00541F004_2_00541F00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004ECF204_2_004ECF20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004F2FD04_2_004F2FD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00501FE04_2_00501FE0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004FFFA04_2_004FFFA0
    Source: C:\Users\user\Desktop\rise2406.exeCode function: String function: 0052A0C0 appears 50 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00547510 appears 102 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434380 appears 54 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041ACE0 appears 52 times
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs rise2406.exe
    Source: rise2406.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: rise2406.exeStatic PE information: Section: .data ZLIB complexity 0.9968365897495362
    Source: classification engineClassification label: mal100.troj.evad.winEXE@7/6@2/3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00545050 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,4_2_00545050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00544A40 GetDiskFreeSpaceW,GetDiskFreeSpaceA,4_2_00544A40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0048F070 CreateDirectoryA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,4_2_0048F070
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1456:120:WilError_03
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3180
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user~1\AppData\Local\Temp\trixyuIHtL4lTJ8ciJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: rise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: rise2406.exeReversingLabs: Detection: 87%
    Source: rise2406.exeVirustotal: Detection: 78%
    Source: RegAsm.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
    Source: unknownProcess created: C:\Users\user\Desktop\rise2406.exe "C:\Users\user\Desktop\rise2406.exe"
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
    Source: rise2406.exeStatic file information: File size 1870848 > 1048576
    Source: rise2406.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x194400
    Source: rise2406.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: rise2406.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,4_2_004CF280
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00529AAF push ecx; ret 0_2_00529AC2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00433F59 push ecx; ret 4_2_00433F6C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004EE170 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_004EE170
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_4-69899
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_4-69900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeStalling execution: Execution stalls by calling Sleepgraph_4-70391
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,4_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3303Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6588Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_4-70413
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_4-70426
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 5.7 %
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep count: 3303 > 30Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep time: -333603s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep count: 6588 > 30Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep time: -665388s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_005449B0 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 005449F1h4_2_005449B0
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053C8CD FindFirstFileExW,0_2_0053C8CD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6000 CreateDirectoryA,FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004C6000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00432022 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,4_2_00432022
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004E6770 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,4_2_004E6770
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004938D0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,4_2_004938D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B60 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,CredEnumerateA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlenA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,lstrlenA,4_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044FC2F FindFirstFileExW,4_2_0044FC2F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00431F9C FindClose,FindFirstFileExW,GetLastError,4_2_00431F9C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004580D8 VirtualQuery,GetSystemInfo,4_2_004580D8
    Source: Amcache.hve.7.drBinary or memory string: VMware
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: RegAsm.exe, 00000004.00000002.2546153992.0000000000DB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\rise2406.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052DED3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0052DED3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,4_2_004CF280
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00533A8C mov ecx, dword ptr fs:[00000030h]0_2_00533A8C
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_005385C5 mov eax, dword ptr fs:[00000030h]0_2_005385C5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045DB00 mov eax, dword ptr fs:[00000030h]4_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0045DB00 mov eax, dword ptr fs:[00000030h]4_2_0045DB00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004D6280 mov eax, dword ptr fs:[00000030h]4_2_004D6280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00493B60 mov eax, dword ptr fs:[00000030h]4_2_00493B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004D2DC0 mov ecx, dword ptr fs:[00000030h]4_2_004D2DC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004C6D80 mov eax, dword ptr fs:[00000030h]4_2_004C6D80
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0053DAB5 GetProcessHeap,0_2_0053DAB5
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052A04B SetUnhandledExceptionFilter,0_2_0052A04B
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052A105 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0052A105
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052DED3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0052DED3
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00529EEF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00529EEF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434184 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00434184
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00434311 SetUnhandledExceptionFilter,4_2_00434311
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0043451D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00438A64

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\rise2406.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_007A018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_007A018D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,4_2_004CF280
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 55D000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 585000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58A000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 58C000Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 821008Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_00529C95 cpuid 0_2_00529C95
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00540033
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_0053F8CA
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_005370FB
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_0053F971
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_0053F9BC
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_0053FA57
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0053FAE2
    Source: C:\Users\user\Desktop\rise2406.exeCode function: EnumSystemLocalesW,0_2_00536BD5
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_0053FD35
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0053FE5E
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_0053F6CF
    Source: C:\Users\user\Desktop\rise2406.exeCode function: GetLocaleInfoW,0_2_0053FF64
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_004531CA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_0044B1B1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_004532F3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_004533F9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_004534CF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_0044B734
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,4_2_00452B5A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,4_2_00452D5F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoEx,FormatMessageA,4_2_00431D94
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452E51
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452E06
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,4_2_00452EEC
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_00452F77
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\rise2406.exeCode function: 0_2_0052A302 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0052A302
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_004DFF00 CreateDirectoryA,FindFirstFileA,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,4_2_004DFF00
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_0044D130 GetTimeZoneInformation,4_2_0044D130
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_00545050 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,4_2_00545050
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2516, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2516, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    511
    Process Injection
    12
    Virtualization/Sandbox Evasion
    OS Credential Dumping12
    System Time Discovery
    Remote Services1
    Archive Collected Data
    21
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts12
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    511
    Process Injection
    LSASS Memory151
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager12
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Software Packing
    LSA Secrets1
    Application Window Discovery
    SSHKeylogging13
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    Account Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    System Owner/User Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
    System Network Configuration Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
    File and Directory Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing36
    System Information Discovery
    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1462857 Sample: rise2406.exe Startdate: 26/06/2024 Architecture: WINDOWS Score: 100 23 ipinfo.io 2->23 25 db-ip.com 2->25 33 Snort IDS alert for network traffic 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected RisePro Stealer 2->37 39 2 other signatures 2->39 7 rise2406.exe 1 2->7         started        signatures3 process4 signatures5 41 Contains functionality to inject code into remote processes 7->41 43 Writes to foreign memory regions 7->43 45 Allocates memory in foreign processes 7->45 47 Injects a PE file into a foreign processes 7->47 10 RegAsm.exe 7->10         started        13 RegAsm.exe 2 7->13         started        16 WerFault.exe 21 16 7->16         started        19 conhost.exe 7->19         started        process6 dnsIp7 49 Found stalling execution ending in API Sleep call 10->49 51 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 10->51 53 Found API chain indicative of sandbox detection 10->53 55 Contains functionality to inject threads in other processes 10->55 27 5.42.67.8, 49701, 50500 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 13->27 29 ipinfo.io 34.117.186.192, 443, 49720 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 13->29 31 db-ip.com 172.67.75.166, 443, 49721 CLOUDFLARENETUS United States 13->31 21 C:\ProgramData\Microsoft\...\Report.wer, Unicode 16->21 dropped file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    rise2406.exe88%ReversingLabsWin32.Trojan.LummaStealer
    rise2406.exe79%VirustotalBrowse
    rise2406.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://ipinfo.io/0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
    https://ipinfo.io:443/widget/demo/8.46.123.330%Avira URL Cloudsafe
    https://db-ip.com/0%Avira URL Cloudsafe
    https://ipinfo.io/widget/demo/8.46.123.330%Avira URL Cloudsafe
    https://db-ip.com:443/demo/home.php?s=8.46.123.33J0%Avira URL Cloudsafe
    https://ipinfo.io/q0%Avira URL Cloudsafe
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
    https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
    https://ipinfo.io/Mozilla/5.00%Avira URL Cloudsafe
    https://db-ip.com/demo/home.php?s=8.46.123.330%Avira URL Cloudsafe
    https://ipinfo.io/widget/demo/8.46.123.33:0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ipinfo.io
    34.117.186.192
    truefalse
      unknown
      db-ip.com
      172.67.75.166
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://ipinfo.io/false
        • URL Reputation: safe
        unknown
        https://ipinfo.io/widget/demo/8.46.123.33false
        • Avira URL Cloud: safe
        unknown
        https://db-ip.com/demo/home.php?s=8.46.123.33false
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://db-ip.com:443/demo/home.php?s=8.46.123.33JRegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io:443/widget/demo/8.46.123.33RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/qRegAsm.exe, 00000004.00000002.2546153992.0000000000D88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://www.maxmind.com/en/locate-my-ip-addressRegAsm.exefalse
        • Avira URL Cloud: safe
        unknown
        https://db-ip.com/RegAsm.exe, 00000004.00000002.2546153992.0000000000DFF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllrise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.winimage.com/zLibDllrise2406.exe, 00000000.00000002.1446239278.0000000000554000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000004.00000002.2545502529.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://upx.sf.netAmcache.hve.7.drfalse
        • URL Reputation: safe
        unknown
        https://t.me/RiseProSUPPORTRegAsm.exe, 00000004.00000002.2546153992.0000000000D5A000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/Mozilla/5.0RegAsm.exe, 00000004.00000002.2546153992.0000000000DDF000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://ipinfo.io/widget/demo/8.46.123.33:RegAsm.exe, 00000004.00000002.2546153992.0000000000D96000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        34.117.186.192
        ipinfo.ioUnited States
        139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
        172.67.75.166
        db-ip.comUnited States
        13335CLOUDFLARENETUSfalse
        5.42.67.8
        unknownRussian Federation
        39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1462857
        Start date and time:2024-06-26 08:56:44 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 52s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:15
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:rise2406.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@7/6@2/3
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 79%
        • Number of executed functions: 29
        • Number of non-executed functions: 159
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.94
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        02:57:58API Interceptor1x Sleep call for process: WerFault.exe modified
        04:11:36API Interceptor261810x Sleep call for process: RegAsm.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        34.117.186.192Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
        • ipinfo.io/ip
        HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/
        HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/
        HP-patchedUS-deobfuscated.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/
        SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/json
        SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
        • ipinfo.io/json
        Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
        • ipinfo.io/ip
        Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
        • ipinfo.io/
        Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
        • ipinfo.io/
        w.shGet hashmaliciousXmrigBrowse
        • /ip
        172.67.75.166http://luxury-sherbet-tk1111-10e1b5.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
          https://cn10.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousRisePro StealerBrowse
              YnsEArPlqx.exeGet hashmaliciousRisePro StealerBrowse
                T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    https://curious-kringle-id4964-024b3b3.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                      4Ip0IVHqJ3.exeGet hashmaliciousRisePro StealerBrowse
                        https://gacw-no-reply-restriction-appeal-case.netlify.app/feedback_id_38258467296/Get hashmaliciousUnknownBrowse
                          http://rules-prohibiting-violative-advertisi.netlify.app/appeal_case_ID_78234127826/Get hashmaliciousUnknownBrowse
                            5.42.67.81kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                              BY1Fwf74x3.exeGet hashmaliciousRisePro Stealer, VidarBrowse
                                SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                  CHA0VZiz8y.exeGet hashmaliciousCryptOne, Djvu, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, VidarBrowse
                                    SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                      WaGiUWSpyO.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                        BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                          1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ipinfo.ioRaptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            file.exeGet hashmaliciousRisePro StealerBrowse
                                            • 34.117.186.192
                                            http://telegravm.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrarl.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegraem.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrema.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrram.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrmaw.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrnal.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrma.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            db-ip.comfile.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.5.15
                                            http://luxury-sherbet-tk1111-10e1b5.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                                            • 172.67.75.166
                                            https://le-2vr.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            https://e23-c5p.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            https://ml5-94x.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            https://cn10.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                                            • 172.67.75.166
                                            https://verify-infraction-messages.netlify.app/appeal_case_id_561597519/Get hashmaliciousUnknownBrowse
                                            • 104.26.5.15
                                            90ZF1EDs9h.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.5.15
                                            BqqQh4Jr7L.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.4.15
                                            file.exeGet hashmaliciousRisePro StealerBrowse
                                            • 104.26.4.15
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfile.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            file.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 5.42.66.10
                                            file.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93_dump.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            file.exeGet hashmaliciousRedLineBrowse
                                            • 5.42.65.92
                                            DqnftBv2b9.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                            • 5.42.104.211
                                            1kBeqS7E3z.exeGet hashmaliciousLummaC, RisePro Stealer, VidarBrowse
                                            • 5.42.65.116
                                            file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                            • 5.42.65.92
                                            GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://riprogramma.consegna.3-79-47-0.cprapid.com/brt/update.php?%276Get hashmaliciousUnknownBrowse
                                            • 34.117.77.79
                                            http://3-79-47-0.cprapid.com/brt/update.php?%2704bd392f228f637be355Get hashmaliciousUnknownBrowse
                                            • 34.117.77.79
                                            https://opposite-grandiose-flock.glitch.me/public/digitalapps.navyfederal.org.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 34.117.77.79
                                            Authorization code - SO10552124.PDFGet hashmaliciousUnknownBrowse
                                            • 34.117.77.79
                                            Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            https://eex2ujl43dm.larksuite.com/wiki/Ui6DwyQ8kilW7qkvx66uyYsusXb?from=from_copylinkGet hashmaliciousHTMLPhisherBrowse
                                            • 34.117.97.41
                                            file.exeGet hashmaliciousRisePro StealerBrowse
                                            • 34.117.186.192
                                            http://telegravm.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegrarl.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            http://telegraem.work/Get hashmaliciousTelegram PhisherBrowse
                                            • 34.117.186.192
                                            CLOUDFLARENETUS_Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            ORDEN DE COMPRA OI1597.exeGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            288292021 ABB.exeGet hashmaliciousFormBookBrowse
                                            • 188.114.96.3
                                            GG017077 TAE.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            0Z0CbhhLet.exeGet hashmaliciousQuasarBrowse
                                            • 172.67.74.152
                                            txJO1YslwA.rtfGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            GOoY5QBqvC.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 104.16.167.29
                                            clamav-26507ecba954172bdcc6c436a16c6d66.tmpGet hashmaliciousAgentTeslaBrowse
                                            • 172.67.74.152
                                            https://nekofile.eu.org/d7e69ef7da63a0b454230diajGet hashmaliciousUnknownBrowse
                                            • 172.64.41.3
                                            https://nekofile.eu.org/f8e2cb54931bf39d6c12eo5ncGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            a0e9f5d64349fb13191bc781f81f42e1qoe1X4ig0N.exeGet hashmaliciousLummaC, AsyncRAT, DarkTortilla, LummaC Stealer, Njrat, SmokeLoader, StormKittyBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            proof.cmdGet hashmaliciousDBatLoader, RemcosBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            pmrD6U8p5z.xlsGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            Techno_PO LV12406-003211.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            Techno_PO LV12406-00311.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            PO LV12406-00390.xla.xlsxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            BlockIps.DocxGet hashmaliciousUnknownBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            Purchase Order.batGet hashmaliciousDBatLoaderBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            7rBFEWNRqy.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                            • 34.117.186.192
                                            • 172.67.75.166
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.7007062601030464
                                            Encrypted:false
                                            SSDEEP:96:jP4FOH/usAhqjoOyDqGQXIDcQZc68cE+cw3Jqe+HbHg/PB6HeaOy1FhZAX/d5FMv:j4gH/u8t0H4UcjG1zuiFyZ24IO8KL
                                            MD5:4F7B153356A21D0E0F145E4132E37263
                                            SHA1:9BA233E6AB5F2F017293B2A2EEF35782D3BACD24
                                            SHA-256:29378ECA28488E4BA5D22B072C57A113873FBEB2A82A10C303F1BA0892DFFB2F
                                            SHA-512:AA3C3D716D22D39545A8727309F3A6F67E4140A0455D8F76AA37F0AE9D4EBA55DED431A96789FC2D15C9DD67A7720DAB6CCBDB3DC21414634BFF5637D403BFBC
                                            Malicious:true
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.3.8.5.8.6.6.4.0.8.2.5.7.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.3.8.5.8.6.6.4.6.7.6.3.2.4.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.d.4.2.8.d.2.d.-.1.b.5.3.-.4.5.6.e.-.a.f.c.5.-.4.4.6.0.5.0.e.7.6.9.4.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.d.0.d.a.3.f.-.5.1.d.a.-.4.b.b.5.-.a.a.7.9.-.b.8.3.c.f.6.2.5.5.f.0.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.i.s.e.2.4.0.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.6.c.-.0.0.0.1.-.0.0.1.4.-.5.e.9.0.-.3.4.2.4.9.6.c.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.9.f.7.8.3.5.9.1.1.b.e.9.f.c.a.f.b.8.f.c.5.b.7.b.0.d.c.0.f.f.3.0.0.0.0.f.f.f.f.!.0.0.0.0.e.5.3.2.4.2.d.4.6.3.e.2.c.9.4.3.8.3.e.c.6.4.6.e.7.e.0.4.5.0.4.b.9.6.b.4.d.1.7.6.!.r.i.s.e.2.4.0.6...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Wed Jun 26 06:57:44 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):47100
                                            Entropy (8bit):1.8252727652124974
                                            Encrypted:false
                                            SSDEEP:192:mykqBVV9OMvskaBktKYUd4kD2yE1WdlVQ5LM:F5wMvskaBktKYI2yE12lVQ5
                                            MD5:BBD9295B206DABE992F3C66CBFBB9C79
                                            SHA1:69893A4AB3B9A1122F4863F0F9EB55BF376BA346
                                            SHA-256:3D6DAA050E5FA8AD4025CADC6EF3081DD6B8CBB4A64FD139081CB2C6CEFC9ABF
                                            SHA-512:4731ECECFAAF5C055037E53BA2D14051DF9CE5EFEDC764EB855461C2E5D62BFCBC80C5298EA094284E7927FF86A186403867E1382525AE90ACED335E42CAF48B
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... ........{f........................X...............N#..........T.......8...........T...........@...............T...........@...............................................................................eJ..............GenuineIntel............T.......l....{f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8344
                                            Entropy (8bit):3.7039735507651863
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJ+W606YN1SUHQgmfvJ2Xyprr89boMsfJ4m:R6lXJP606YvSUHQgmfvJ2LoffD
                                            MD5:F4E60215C8F423BDB047EB40142F28A6
                                            SHA1:DC99EBC00D009FE23795FE8A91FCFA1830E85C4F
                                            SHA-256:52F2ADE8FA5579441E043B494D8697CA21C6B212C7692D3A23534ED23EA68E6D
                                            SHA-512:68B6371DDDA400177012A768E063E4C313375F192ABF870356A1EFCDBB4E4037F29AF6FFA6263D716C23BCB9F4C894F7693061F3EC354602E0043FE046DD6AC6
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.8.0.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4625
                                            Entropy (8bit):4.493182411741148
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsCJg77aI9JiTWpW8VYMYm8M4JHVFl+q8TMhkKWBSad:uIjfQI7Si7VwJV3kKWkad
                                            MD5:BD57B6DFB4823B8CAE63139D142F06EB
                                            SHA1:C02B4B67C4B49A0F8268B7F4D6A08552737B7524
                                            SHA-256:F5D61207F9616815B42EC173AE223B372C55824E2F5988DB69BF147481B9F982
                                            SHA-512:08C1A8B85C62EF3B5BFDBB7DD43ACF79A4B97523CCD1C708DF4F77F4FDB9FDE7C84D32229232529359B246C01E3D7759ED85ACBC32036D906C2C32A758DE259B
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="384360" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.4166480132445125
                                            Encrypted:false
                                            SSDEEP:6144:fcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuN95+5:Ei58oSWIZBk2MM6AFBDo5
                                            MD5:0E19D08FE18D8BD9DE175F332BD75147
                                            SHA1:A743943723D85AA0D0F2181FA2026053489E95E1
                                            SHA-256:9541293C1501798039581F86A203B769D3739667EABF080E5E54C62CA8CB13BC
                                            SHA-512:611318A3E6CD7C0C02F95154D3095C20AA2F2C72B4DE8B8D5A6978C9F048B2429F3D09E8EB0F5E29C00E6A7034A21B01BD0058087D9BC298A027612867935173
                                            Malicious:false
                                            Reputation:low
                                            Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.3.$............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\rise2406.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):14
                                            Entropy (8bit):3.3248629576173565
                                            Encrypted:false
                                            SSDEEP:3:oJCVNV:o8/V
                                            MD5:2C34338A8C340C46983875A53A889FC3
                                            SHA1:5EF486E22F88756BE456209030D46D3D94C21952
                                            SHA-256:511FF7ADE84BB22C9B35B62A64FC4100A1958E8D20CB795031199748A926E507
                                            SHA-512:61A221F599A577BC988C6CFF3319F214A62F066B5086C7D8841E8B88BC9FB6CC4F93E8E48E25382BB8148C8F26D045AD15A927ACF0742E69E24923A4659FF633
                                            Malicious:false
                                            Reputation:low
                                            Preview:Illkjmuueghu 0
                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                            Entropy (8bit):7.948024837182058
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:rise2406.exe
                                            File size:1'870'848 bytes
                                            MD5:c6c9f27d335d4e47b5ea12653e806be6
                                            SHA1:e53242d463e2c94383ec646e7e04504b96b4d176
                                            SHA256:514efbae5faa43878c743c3db36f81c25ab5d6da93b879b6e88e7a63b1b19769
                                            SHA512:7e00bdac39c89821b776dda372693d29e0e7188f8ef747037b971461af79545908f8fc8c9bbf7a30f1b0cc4ceea45632e91c1093e784002994808c19bd2a7347
                                            SSDEEP:49152:KWPLwXMkW4itwCBDtixjSzceiLYtV25Mm8eEMMd:tPLPkW4IwcOj6iLYtV+Mw8
                                            TLSH:6C852300F4908073C562167706E4DFB69A7EB9714B725CDB6BA44FBF4F306C09632A6A
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.}.@.}.@.}...~.Q.}...x...}...y.V.}..sy.R.}...|.G.}.@.|...}..sx...}..s~.X.}..px.A.}..p..A.}.Rich@.}.................PE..L..
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x409aa5
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows cui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x66789839 [Sun Jun 23 21:48:41 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:0
                                            File Version Major:6
                                            File Version Minor:0
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:0
                                            Import Hash:e4019b337e6aa53400bb9378be49b858
                                            Instruction
                                            call 00007F238CDFCE3Ah
                                            jmp 00007F238CDFC409h
                                            mov ecx, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], ecx
                                            pop ecx
                                            pop edi
                                            pop edi
                                            pop esi
                                            pop ebx
                                            mov esp, ebp
                                            pop ebp
                                            push ecx
                                            ret
                                            mov ecx, dword ptr [ebp-10h]
                                            xor ecx, ebp
                                            call 00007F238CDFC2F5h
                                            jmp 00007F238CDFC572h
                                            push eax
                                            push dword ptr fs:[00000000h]
                                            lea eax, dword ptr [esp+0Ch]
                                            sub esp, dword ptr [esp+0Ch]
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [eax], ebp
                                            mov ebp, eax
                                            mov eax, dword ptr [005C69C0h]
                                            xor eax, ebp
                                            push eax
                                            push dword ptr [ebp-04h]
                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                            lea eax, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], eax
                                            ret
                                            push eax
                                            push dword ptr fs:[00000000h]
                                            lea eax, dword ptr [esp+0Ch]
                                            sub esp, dword ptr [esp+0Ch]
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [eax], ebp
                                            mov ebp, eax
                                            mov eax, dword ptr [005C69C0h]
                                            xor eax, ebp
                                            push eax
                                            mov dword ptr [ebp-10h], eax
                                            push dword ptr [ebp-04h]
                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                            lea eax, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], eax
                                            ret
                                            push eax
                                            push dword ptr fs:[00000000h]
                                            lea eax, dword ptr [esp+0Ch]
                                            sub esp, dword ptr [esp+0Ch]
                                            push ebx
                                            push esi
                                            push edi
                                            mov dword ptr [eax], ebp
                                            mov ebp, eax
                                            mov eax, dword ptr [005C69C0h]
                                            xor eax, ebp
                                            push eax
                                            mov dword ptr [ebp-10h], esp
                                            push dword ptr [ebp-04h]
                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                            lea eax, dword ptr [ebp-0Ch]
                                            mov dword ptr fs:[00000000h], eax
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x335940x50.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1ca0000x21f0.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x30a680x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x30ac00x18.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x309a80x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x280000x180.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x251c20x25200ad92eac1a3518c94a50c469e832eda52False0.5649134574915825data6.636592053866142IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .BSs0x270000xe1d0x100074293e678f0de25bb463c0dccc7904d8False0.583740234375data6.002868469254389IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x280000xbe860xc000b0aa40c4aa7dfc2011d6ffe63826f1cdFalse0.41448974609375data4.98810951337647IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x340000x19534c0x1944004d397285c775cfc4554c7ce0ca0071fcFalse0.9968365897495362data7.999224560090972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .reloc0x1ca0000x21f00x2200f4f8da3f2dfcb44938435d58d7a1d96fFalse0.7734375data6.553528678280142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            DLLImport
                                            GDI32.dllPolyline, RectVisible
                                            USER32.dllOffsetRect
                                            KERNEL32.dllCreateFileW, HeapSize, SetStdHandle, WaitForSingleObject, CreateThread, VirtualAlloc, FreeConsole, RaiseException, InitOnceBeginInitialize, InitOnceComplete, CloseHandle, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, GetCPInfo, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, GetProcessHeap, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, WriteConsoleW
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            06/26/24-08:59:32.465846TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)50500497015.42.67.8192.168.2.7
                                            06/26/24-08:59:36.929586TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970150500192.168.2.75.42.67.8
                                            06/26/24-08:57:45.307172TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4970150500192.168.2.75.42.67.8
                                            06/26/24-08:57:45.857539TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)50500497015.42.67.8192.168.2.7
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 26, 2024 08:57:45.297755003 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:45.304011106 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:57:45.304169893 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:45.307172060 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:45.311940908 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:57:45.857538939 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:57:45.897598028 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:48.976103067 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:57:48.981566906 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:20.319787979 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:20.324636936 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:39.116864920 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:39.121699095 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:48.507325888 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:48.512460947 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:51.632371902 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:51.637187958 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:54.773797989 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:54.778863907 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:58:57.898468971 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:58:57.903498888 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:01.023139000 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:01.028254986 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:04.163611889 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:04.168463945 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:07.288690090 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:07.353250980 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:10.429568052 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:10.549530983 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:13.569916964 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:13.576683044 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:16.710654974 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:16.715524912 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:19.851167917 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:19.856040955 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:22.992151022 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:22.997278929 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:26.116830111 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:26.183959007 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:29.242022038 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:29.247180939 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.382481098 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:32.433741093 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.435168982 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.465846062 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:32.465996027 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:32.549282074 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:32.549349070 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:32.549700022 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:32.553071976 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:32.553092957 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.008507013 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.008841038 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.016993999 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.017016888 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.017276049 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.069917917 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.075551987 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.120506048 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.204579115 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.204700947 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.204777002 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.207257986 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.207257986 CEST49720443192.168.2.734.117.186.192
                                            Jun 26, 2024 08:59:33.207282066 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.207292080 CEST4434972034.117.186.192192.168.2.7
                                            Jun 26, 2024 08:59:33.227814913 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.227871895 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.227955103 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.228293896 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.228312016 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.689722061 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.689811945 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.693711042 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.693731070 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.694144964 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.698007107 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.744504929 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.797836065 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:33.851438999 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:33.897752047 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.897984028 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.898348093 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.900158882 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.900192022 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.900362015 CEST49721443192.168.2.7172.67.75.166
                                            Jun 26, 2024 08:59:33.900371075 CEST44349721172.67.75.166192.168.2.7
                                            Jun 26, 2024 08:59:33.901794910 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:33.949876070 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:36.929585934 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:36.934513092 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:38.961268902 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:39.007390022 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:46.685332060 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:46.741777897 CEST4970150500192.168.2.75.42.67.8
                                            Jun 26, 2024 08:59:48.365884066 CEST50500497015.42.67.8192.168.2.7
                                            Jun 26, 2024 08:59:48.413897991 CEST4970150500192.168.2.75.42.67.8
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 26, 2024 08:59:32.535058022 CEST6312153192.168.2.71.1.1.1
                                            Jun 26, 2024 08:59:32.542617083 CEST53631211.1.1.1192.168.2.7
                                            Jun 26, 2024 08:59:33.210113049 CEST6358153192.168.2.71.1.1.1
                                            Jun 26, 2024 08:59:33.226600885 CEST53635811.1.1.1192.168.2.7
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jun 26, 2024 08:59:32.535058022 CEST192.168.2.71.1.1.10x1ba0Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.210113049 CEST192.168.2.71.1.1.10xb2b6Standard query (0)db-ip.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jun 26, 2024 08:59:32.542617083 CEST1.1.1.1192.168.2.70x1ba0No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.226600885 CEST1.1.1.1192.168.2.70xb2b6No error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.226600885 CEST1.1.1.1192.168.2.70xb2b6No error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                            Jun 26, 2024 08:59:33.226600885 CEST1.1.1.1192.168.2.70xb2b6No error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                            • ipinfo.io
                                            • https:
                                            • db-ip.com
                                            Session IDSource IPSource PortDestination IPDestination Port
                                            0192.168.2.74970034.117.186.192443
                                            TimestampBytes transferredDirectionData
                                            2024-06-26 06:57:37 UTC59OUTGET / HTTP/1.1
                                            Host: ipinfo.io
                                            Connection: Keep-Alive
                                            2024-06-26 06:57:37 UTC513INHTTP/1.1 200 OK
                                            server: nginx/1.24.0
                                            date: Wed, 26 Jun 2024 06:57:37 GMT
                                            content-type: application/json; charset=utf-8
                                            Content-Length: 319
                                            access-control-allow-origin: *
                                            x-frame-options: SAMEORIGIN
                                            x-xss-protection: 1; mode=block
                                            x-content-type-options: nosniff
                                            referrer-policy: strict-origin-when-cross-origin
                                            x-envoy-upstream-service-time: 2
                                            via: 1.1 google
                                            strict-transport-security: max-age=2592000; includeSubDomains
                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                            Connection: close
                                            2024-06-26 06:57:37 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                                            Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.74972034.117.186.1924432516C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            2024-06-26 06:59:33 UTC236OUTGET /widget/demo/8.46.123.33 HTTP/1.1
                                            Connection: Keep-Alive
                                            Referer: https://ipinfo.io/
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                            Host: ipinfo.io
                                            2024-06-26 06:59:33 UTC514INHTTP/1.1 200 OK
                                            server: nginx/1.24.0
                                            date: Wed, 26 Jun 2024 06:59:33 GMT
                                            content-type: application/json; charset=utf-8
                                            Content-Length: 1025
                                            access-control-allow-origin: *
                                            x-frame-options: SAMEORIGIN
                                            x-xss-protection: 1; mode=block
                                            x-content-type-options: nosniff
                                            referrer-policy: strict-origin-when-cross-origin
                                            x-envoy-upstream-service-time: 3
                                            via: 1.1 google
                                            strict-transport-security: max-age=2592000; includeSubDomains
                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                            Connection: close
                                            2024-06-26 06:59:33 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20
                                            Data Ascii: { "input": "8.46.123.33", "data": { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level
                                            2024-06-26 06:59:33 UTC149INData Raw: 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                            Data Ascii: email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.749721172.67.75.1664432516C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            2024-06-26 06:59:33 UTC260OUTGET /demo/home.php?s=8.46.123.33 HTTP/1.1
                                            Connection: Keep-Alive
                                            Content-Type: application/x-www-form-urlencoded
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                            Host: db-ip.com
                                            2024-06-26 06:59:33 UTC665INHTTP/1.1 200 OK
                                            Date: Wed, 26 Jun 2024 06:59:33 GMT
                                            Content-Type: application/json
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            x-iplb-request-id: AC466F7F:9CA2_93878F2E:0050_667BBC55_15DB0975:4F34
                                            x-iplb-instance: 59215
                                            CF-Cache-Status: DYNAMIC
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dxI4ToxjZw9q7QF94cxCc0W%2Flhon%2FcwjswI43%2F%2FN%2FRRSnUORQOEnriRS2ngRG1aa1GoK90MxS4hSo%2FfQCvUW7StzpCfuug%2F9ELHmTdOyAJ0zUo9FX0MAt%2FE2CA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 899b50b8199e1839-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-06-26 06:59:33 UTC673INData Raw: 32 39 61 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 69 70 41 64 64 72 65 73 73 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 22 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 69 73 45 75 4d 65 6d 62 65 72 22 3a 66 61 6c 73 65 2c 22 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 22 63 75 72 72 65 6e 63 79 4e 61 6d 65 22 3a 22 44 6f 6c 6c 61 72 22 2c 22 70 68 6f 6e 65 50 72 65 66 69 78 22 3a 22 31 22 2c 22 6c 61 6e 67 75 61 67 65 73 22 3a 5b
                                            Data Ascii: 29a{"status":"ok","demoInfo":{"ipAddress":"8.46.123.33","continentCode":"NA","continentName":"North America","countryCode":"US","countryName":"United States","isEuMember":false,"currencyCode":"USD","currencyName":"Dollar","phonePrefix":"1","languages":[
                                            2024-06-26 06:59:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:02:57:42
                                            Start date:26/06/2024
                                            Path:C:\Users\user\Desktop\rise2406.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\rise2406.exe"
                                            Imagebase:0x520000
                                            File size:1'870'848 bytes
                                            MD5 hash:C6C9F27D335D4E47B5EA12653E806BE6
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:02:57:42
                                            Start date:26/06/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff75da10000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:02:57:43
                                            Start date:26/06/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            Imagebase:0x260000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:02:57:43
                                            Start date:26/06/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            Imagebase:0x620000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:7
                                            Start time:02:57:43
                                            Start date:26/06/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 140
                                            Imagebase:0x40000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Reset < >