Loading ...

Play interactive tourEdit tour

Analysis Report yQDGREHA9h.exe

Overview

General Information

Sample Name:yQDGREHA9h.exe
Analysis ID:321298
MD5:c11d6124ee0522c7ab71d20cf3474dc0
SHA1:c52a64b7189c762b907a9d727950f3d1364c68ba
SHA256:871a7f14c61157dbea48d27f92bc64097e10eb44a9c8ef7543c435e275ca249c
Tags:AgentTeslaexe

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • yQDGREHA9h.exe (PID: 7020 cmdline: 'C:\Users\user\Desktop\yQDGREHA9h.exe' MD5: C11D6124EE0522C7AB71D20CF3474DC0)
    • RegAsm.exe (PID: 4576 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 4596 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • RegAsm.exe (PID: 4496 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • yQDGREHA9h.exe (PID: 6296 cmdline: 'C:\Users\user\Desktop\yQDGREHA9h.exe' MD5: C11D6124EE0522C7AB71D20CF3474DC0)
      • RegAsm.exe (PID: 5760 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "FD4rx", "URL: ": "https://gQdNNrdkwNQuy.com", "To: ": "peter.terkper@gh-wilmar-intl.com", "ByHost: ": "us2.smtp.mailhostbox.com:587", "Password: ": "VWxfjLlGpC", "From: ": "peter.terkper@gh-wilmar-intl.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.519501217.000000000129F000.00000004.00000020.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.yQDGREHA9h.exe.5360000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.2.yQDGREHA9h.exe.5550000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                4.2.RegAsm.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  6.2.RegAsm.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                    Sigma Overview

                    System Summary:

                    barindex
                    Sigma detected: RegAsm connects to smtp portShow sources
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 208.91.199.223, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 5760, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49741

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Found malware configurationShow sources
                    Source: RegAsm.exe.5760.6.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "FD4rx", "URL: ": "https://gQdNNrdkwNQuy.com", "To: ": "peter.terkper@gh-wilmar-intl.com", "ByHost: ": "us2.smtp.mailhostbox.com:587", "Password: ": "VWxfjLlGpC", "From: ": "peter.terkper@gh-wilmar-intl.com"}
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: yQDGREHA9h.exeVirustotal: Detection: 32%Perma Link
                    Source: yQDGREHA9h.exeReversingLabs: Detection: 51%
                    Machine Learning detection for sampleShow sources
                    Source: yQDGREHA9h.exeJoe Sandbox ML: detected
                    Source: 4.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 6.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8

                    Networking:

                    barindex
                    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49741 -> 208.91.199.223:587
                    May check the online IP address of the machineShow sources
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49741 -> 208.91.199.223:587
                    Source: Joe Sandbox ViewIP Address: 54.235.83.248 54.235.83.248
                    Source: Joe Sandbox ViewIP Address: 54.235.83.248 54.235.83.248
                    Source: Joe Sandbox ViewIP Address: 208.91.199.223 208.91.199.223
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: global trafficTCP traffic: 192.168.2.5:49741 -> 208.91.199.223:587
                    Source: unknownDNS traffic detected: queries for: g.msn.com
                    Source: RegAsm.exe, 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: http://VaMNef.com
                    Source: RegAsm.exe, 00000006.00000002.525712383.0000000005EF2000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: RegAsm.exe, 00000006.00000002.525712383.0000000005EF2000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                    Source: RegAsm.exe, 00000006.00000002.525712383.0000000005EF2000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegAsm.exe, 00000006.00000002.521726463.0000000003052000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: yQDGREHA9h.exe, 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, RegAsm.exe, 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, RegAsm.exe, 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                    Source: RegAsm.exe, 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                    Source: RegAsm.exe, 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.521789373.0000000003062000.00000004.00000001.sdmpString found in binary or memory: https://gQdNNrdkwNQuy.com
                    Source: RegAsm.exe, 00000006.00000002.525712383.0000000005EF2000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                    Source: yQDGREHA9h.exe, 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, RegAsm.exe, 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, RegAsm.exe, 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: RegAsm.exe, 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443

                    System Summary:

                    barindex
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_050A1C09 CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtTerminateProcess,NtUnmapViewOfSection,NtWriteVirtualMemory,NtGetContextThread,NtSetContextThread,NtResumeThread,
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_050A00AD NtOpenSection,NtMapViewOfSection,
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_005FF5C1
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_027504F0
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_027504E1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_029B46A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_029B45B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_029BD2E0
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 5_2_00C8F5C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02C246A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02C23CF6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02C24630
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_02C245B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06126C60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06127530
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_061290F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06126918
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064FC758
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064F37E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064F8F90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064F1DB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064F30C8
                    Source: yQDGREHA9h.exe, 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepwsSelYjnDuiaJji.bounce.exe4 vs yQDGREHA9h.exe
                    Source: yQDGREHA9h.exe, 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSWPZhCERqvWyNKntNHGDwfCzykBRDdaNrNk.exe4 vs yQDGREHA9h.exe
                    Source: yQDGREHA9h.exe, 00000000.00000002.530220941.0000000006870000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs yQDGREHA9h.exe
                    Source: yQDGREHA9h.exe, 00000000.00000002.530394947.0000000006960000.00000002.00000001.sdmpBinary or memory string: originalfilename vs yQDGREHA9h.exe
                    Source: yQDGREHA9h.exe, 00000000.00000002.530394947.0000000006960000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs yQDGREHA9h.exe
                    Source: yQDGREHA9h.exe, 00000005.00000002.529019717.00000000057E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepwsSelYjnDuiaJji.bounce.exe4 vs yQDGREHA9h.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                    Source: yQDGREHA9h.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/0@4/2
                    Source: yQDGREHA9h.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: yQDGREHA9h.exeVirustotal: Detection: 32%
                    Source: yQDGREHA9h.exeReversingLabs: Detection: 51%
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeFile read: C:\Users\user\Desktop\yQDGREHA9h.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\yQDGREHA9h.exe 'C:\Users\user\Desktop\yQDGREHA9h.exe'
                    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: unknownProcess created: C:\Users\user\Desktop\yQDGREHA9h.exe 'C:\Users\user\Desktop\yQDGREHA9h.exe'
                    Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Users\user\Desktop\yQDGREHA9h.exe 'C:\Users\user\Desktop\yQDGREHA9h.exe'
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: yQDGREHA9h.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: yQDGREHA9h.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0612F4E0 pushad ; iretd
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0612E6C5 push BA000000h; ret
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064F7620 push es; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.8672821185
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion:

                    barindex
                    Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeWindow / User API: threadDelayed 486
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeWindow / User API: threadDelayed 2389
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeWindow / User API: threadDelayed 1768
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 732
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exe TID: 7024Thread sleep time: -47780s >= -30000s
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exe TID: 6464Thread sleep count: 263 > 30
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exe TID: 6352Thread sleep count: 1768 > 30
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exe TID: 6352Thread sleep time: -35360s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -4611686018427385s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5616Thread sleep count: 62 > 30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5616Thread sleep count: 732 > 30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -59500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -118624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -58406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -58186s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -58000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -86718s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -57312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -57094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -56906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -113372s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -111624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -111188s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -54906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -54686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -109000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -81468s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -53812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -53594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -106812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -106372s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -52500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -104624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -52094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -51406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -51186s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -76500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -101624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -50312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -50094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -74859s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -99372s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -99000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -49000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -97624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -97188s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -47686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -95000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -94624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -46812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -46594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -92812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -92372s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -45500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -90624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -90188s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -44406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -44186s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -44000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -87624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -43312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -64359s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -64029s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -42000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -41812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -62391s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -40906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -60750s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -60468s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -59109s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -58779s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -38906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -38686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -38186s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -37906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -37686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -56250s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -74624s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -37094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -36812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -54279s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -53250s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -52968s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -51279s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -51000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -33312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -33094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -49359s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -32686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -32500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -32312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -48000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -31812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -30906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -30686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -30500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -30312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -89718s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -59594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -88359s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -88029s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -58500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -86391s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -57406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -84750s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -56312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -56094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -83109s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -82779s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -54812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -54094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -53906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -53686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -53000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -79218s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -52594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -77859s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -77529s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -51500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -51312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -75891s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -50406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -73968s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -72609s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -72279s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -47812s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -70641s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -46686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -46000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -68718s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -45594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -44906s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -67029s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -44500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -44312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -65391s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -43406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -43186s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -42500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -42312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -62109s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -41186s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -41000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -40094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -39686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -39000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -38594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -38312s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -38094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -37000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -36594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -36406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -35686s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -35094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -34594s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -34406s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -33500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6180Thread sleep time: -31094s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                    Source: RegAsm.exe, 00000004.00000002.290060976.0000000005D00000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.525797285.0000000005F90000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                    Source: RegAsm.exe, 00000006.00000003.512671288.0000000005EEC000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-$
                    Source: RegAsm.exe, 00000004.00000002.290060976.0000000005D00000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.525797285.0000000005F90000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                    Source: RegAsm.exe, 00000004.00000002.290060976.0000000005D00000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.525797285.0000000005F90000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                    Source: RegAsm.exe, 00000004.00000002.290060976.0000000005D00000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.525797285.0000000005F90000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess information queried: ProcessInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0612C8BE KiUserExceptionDispatcher,KiUserExceptionDispatcher,LdrInitializeThunk,KiUserExceptionDispatcher,
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_050A01CB mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_050A00AD mov ecx, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeCode function: 0_2_050A00AD mov eax, dword ptr fs:[00000030h]
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess token adjusted: Debug
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess token adjusted: Debug
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion:

                    barindex
                    Maps a DLL or memory area into another processShow sources
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                    Writes to foreign memory regionsShow sources
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 976008
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Users\user\Desktop\yQDGREHA9h.exe 'C:\Users\user\Desktop\yQDGREHA9h.exe'
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: yQDGREHA9h.exe, 00000000.00000002.520403417.0000000001260000.00000002.00000001.sdmp, yQDGREHA9h.exe, 00000005.00000002.520549215.0000000001A30000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.519975753.0000000001690000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                    Source: yQDGREHA9h.exe, 00000000.00000002.520403417.0000000001260000.00000002.00000001.sdmp, yQDGREHA9h.exe, 00000005.00000002.520549215.0000000001A30000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.519975753.0000000001690000.00000002.00000001.sdmpBinary or memory string: Progman
                    Source: yQDGREHA9h.exe, 00000000.00000002.520403417.0000000001260000.00000002.00000001.sdmp, yQDGREHA9h.exe, 00000005.00000002.520549215.0000000001A30000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.519975753.0000000001690000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
                    Source: yQDGREHA9h.exe, 00000000.00000002.520403417.0000000001260000.00000002.00000001.sdmp, yQDGREHA9h.exe, 00000005.00000002.520549215.0000000001A30000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.519975753.0000000001690000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
                    Source: yQDGREHA9h.exe, 00000000.00000002.520403417.0000000001260000.00000002.00000001.sdmp, yQDGREHA9h.exe, 00000005.00000002.520549215.0000000001A30000.00000002.00000001.sdmp, RegAsm.exe, 00000006.00000002.519975753.0000000001690000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeQueries volume information: C:\Users\user\Desktop\yQDGREHA9h.exe VolumeInformation
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeQueries volume information: C:\Users\user\Desktop\yQDGREHA9h.exe VolumeInformation
                    Source: C:\Users\user\Desktop\yQDGREHA9h.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_061263F4 GetUserNameW,
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.519501217.000000000129F000.00000004.00000020.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.520044654.0000000000C14000.00000004.00000020.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.528900674.0000000005552000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.529526410.0000000005362000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4496, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: yQDGREHA9h.exe PID: 7020, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5760, type: MEMORY
                    Source: Yara matchFile source: 0.2.yQDGREHA9h.exe.5360000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.yQDGREHA9h.exe.5550000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Tries to harvest and steal browser information (history, passwords, etc)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Tries to harvest and steal ftp login credentialsShow sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Tries to steal Mail credentials (via file access)Show sources
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4496, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5760, type: MEMORY

                    Remote Access Functionality:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.519501217.000000000129F000.00000004.00000020.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.520044654.0000000000C14000.00000004.00000020.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.528900674.0000000005552000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.529526410.0000000005362000.00000040.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4496, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: yQDGREHA9h.exe PID: 7020, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5760, type: MEMORY
                    Source: Yara matchFile source: 0.2.yQDGREHA9h.exe.5360000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.yQDGREHA9h.exe.5550000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation211DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection212Obfuscated Files or Information2Credentials in Registry1File and Directory Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing3Security Account ManagerSystem Information Discovery114SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion14LSA SecretsSecurity Software Discovery121SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection212Cached Domain CredentialsVirtualization/Sandbox Evasion14VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureSystem Network Configuration Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 321298 Sample: yQDGREHA9h.exe Startdate: 20/11/2020 Architecture: WINDOWS Score: 100 24 g.msn.com 2->24 32 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->32 34 Found malware configuration 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 4 other signatures 2->38 8 yQDGREHA9h.exe 1 2->8         started        signatures3 process4 signatures5 48 Writes to foreign memory regions 8->48 50 Maps a DLL or memory area into another process 8->50 11 yQDGREHA9h.exe 8->11         started        14 RegAsm.exe 8->14         started        16 RegAsm.exe 2 8->16         started        18 RegAsm.exe 8->18         started        process6 signatures7 52 Maps a DLL or memory area into another process 11->52 20 RegAsm.exe 15 2 11->20         started        54 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->54 56 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->56 process8 dnsIp9 26 us2.smtp.mailhostbox.com 208.91.199.223, 49741, 587 PUBLIC-DOMAIN-REGISTRYUS United States 20->26 28 elb097307-934924932.us-east-1.elb.amazonaws.com 54.235.83.248, 443, 49740 AMAZON-AESUS United States 20->28 30 2 other IPs or domains 20->30 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 20->40 42 Tries to steal Mail credentials (via file access) 20->42 44 Tries to harvest and steal ftp login credentials 20->44 46 Tries to harvest and steal browser information (history, passwords, etc) 20->46 signatures10

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    SourceDetectionScannerLabelLink
                    yQDGREHA9h.exe33%VirustotalBrowse
                    yQDGREHA9h.exe52%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    yQDGREHA9h.exe100%Joe Sandbox ML

                    Dropped Files

                    No Antivirus matches

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    4.2.RegAsm.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    6.2.RegAsm.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    0.2.yQDGREHA9h.exe.5360000.1.unpack100%AviraHEUR/AGEN.1138205Download File
                    5.2.yQDGREHA9h.exe.5550000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                    Domains

                    No Antivirus matches

                    URLs

                    SourceDetectionScannerLabelLink
                    https://gQdNNrdkwNQuy.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://VaMNef.com0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    elb097307-934924932.us-east-1.elb.amazonaws.com
                    54.235.83.248
                    truefalse
                      high
                      us2.smtp.mailhostbox.com
                      208.91.199.223
                      truefalse
                        high
                        g.msn.com
                        unknown
                        unknownfalse
                          high
                          api.ipify.org
                          unknown
                          unknownfalse
                            high

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                              high
                              https://gQdNNrdkwNQuy.comRegAsm.exe, 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.521789373.0000000003062000.00000004.00000001.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low
                              https://api.ipify.orgRegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                high
                                http://DynDns.comDynDNSRegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://us2.smtp.mailhostbox.comRegAsm.exe, 00000006.00000002.521726463.0000000003052000.00000004.00000001.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.org/bot%telegramapi%/yQDGREHA9h.exe, 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, RegAsm.exe, 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, RegAsm.exe, 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmpfalse
                                    high
                                    http://VaMNef.comRegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                      high
                                      https://secure.comodo.com/CPS0RegAsm.exe, 00000006.00000002.525712383.0000000005EF2000.00000004.00000001.sdmpfalse
                                        high
                                        https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xRegAsm.exe, 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                          high
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipyQDGREHA9h.exe, 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, RegAsm.exe, 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, RegAsm.exe, 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.orgGETMozilla/5.0RegAsm.exe, 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          54.235.83.248
                                          unknownUnited States
                                          14618AMAZON-AESUSfalse
                                          208.91.199.223
                                          unknownUnited States
                                          394695PUBLIC-DOMAIN-REGISTRYUSfalse

                                          General Information

                                          Joe Sandbox Version:31.0.0 Red Diamond
                                          Analysis ID:321298
                                          Start date:20.11.2020
                                          Start time:20:03:27
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 9m 58s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:yQDGREHA9h.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:26
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@11/0@4/2
                                          EGA Information:Failed
                                          HDC Information:
                                          • Successful, ratio: 0.5% (good quality ratio 0.4%)
                                          • Quality average: 51.8%
                                          • Quality standard deviation: 30%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          Warnings:
                                          Show All
                                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded IPs from analysis (whitelisted): 104.43.139.144, 13.88.21.125, 2.18.68.82, 51.104.139.180, 52.155.217.156, 51.103.5.186, 20.54.26.129, 52.142.114.176, 92.122.213.247, 92.122.213.194
                                          • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, umwatsonrouting.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          20:04:52API Interceptor770x Sleep call for process: RegAsm.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          54.235.83.248BUILDING ORDER_PROPERTY SPECS.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          OOLU2115890120.xls.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          OBJEDNAT- SII40513967MM793333.PDF.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          5dj4XCE86M.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          di0xAdpLSs.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          payload.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          TNT_Consignment#Ref08971375.gz.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          Our Purchase Order.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          PO-40, PO-41 & PO-42.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          DHL EXPRESS - AWB Numero 06785388011- CONSEGNA DI SPEDIZIONE ORIGINALE.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          vlc-3.0.3-win64.exeGet hashmaliciousBrowse
                                          • api.ipify.org/?format=xml
                                          Haruko Industrial Supply Tents.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          VlkInw3QXN.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          8sDk3xbzN5.exeGet hashmaliciousBrowse
                                          • api.ipify.org/?format=xml
                                          uqJ2lweGkV.exeGet hashmaliciousBrowse
                                          • api.ipify.org/?format=xml
                                          JdZVwprs2g.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          SA765754789654677898367ORDER.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          p.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          Purchase Order_pdf.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          chibyke09.exeGet hashmaliciousBrowse
                                          • api.ipify.org/
                                          208.91.199.223PO1.xlsxGet hashmaliciousBrowse
                                            Vd58qg0dhp.exeGet hashmaliciousBrowse
                                              Wrong Transfer Payment - Chk Clip Copy.exeGet hashmaliciousBrowse
                                                Doc.exeGet hashmaliciousBrowse
                                                  SWIFT.exeGet hashmaliciousBrowse
                                                    TNT Receipt_AWB87993766478.exeGet hashmaliciousBrowse
                                                      BALANCE PAYMENT.exeGet hashmaliciousBrowse
                                                        remittance advice_pdf_____________________________________.exeGet hashmaliciousBrowse
                                                          4Pqkg8wt6j.exeGet hashmaliciousBrowse
                                                            SecuriteInfo.com.Trojan.PackedNET.461.28807.exeGet hashmaliciousBrowse
                                                              sOZgfrw6FT.exeGet hashmaliciousBrowse
                                                                Steel Clik PO#7770022460.exeGet hashmaliciousBrowse
                                                                  P.O. #HBG00356.doc (2).exeGet hashmaliciousBrowse
                                                                    lA1LHK759T.exeGet hashmaliciousBrowse
                                                                      bOp4cgWZkD.exeGet hashmaliciousBrowse
                                                                        5uWZrHiNrw.exeGet hashmaliciousBrowse
                                                                          LUD6Fjo15x.exeGet hashmaliciousBrowse
                                                                            Akribis Systems Pte New PO2006115.exeGet hashmaliciousBrowse
                                                                              5NFH9k6VIL.exeGet hashmaliciousBrowse
                                                                                hqFlnbOS2i.exeGet hashmaliciousBrowse

                                                                                  Domains

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  us2.smtp.mailhostbox.commcsrXx9lfD.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  Bill # 2.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  PO1.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  0hgHwEkIWY.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  Swift Copy.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Shipping Details_PDF.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  RFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Order List.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  Shipping doc.pdf.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  OrV86zxFWHW1j0f.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  XDMBhLJxD1Qf7JW.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  me4qssWAMQ.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  Vd58qg0dhp.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  15egpuWfT3.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Shipping Details.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  Wrong Transfer Payment - Chk Clip Copy.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  WireTransfer Copy767.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  DOH0003675550.pdf.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  aviso de remesas_pdf__________________________________________.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  elb097307-934924932.us-east-1.elb.amazonaws.commcsrXx9lfD.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  SecuriteInfo.com.Trojan.PackedNET.461.20928.exeGet hashmaliciousBrowse
                                                                                  • 23.21.42.25
                                                                                  Defender-update-kit-x86x64.exeGet hashmaliciousBrowse
                                                                                  • 54.225.153.147
                                                                                  https://largemail.r1.rpost.net/files/7xU97qcFgCvB3Uv1wDC4qvS2ZriLfublohKWA5V3/ln/en-usGet hashmaliciousBrowse
                                                                                  • 54.225.66.103
                                                                                  ORDER.exeGet hashmaliciousBrowse
                                                                                  • 54.235.142.93
                                                                                  Bill # 2.xlsxGet hashmaliciousBrowse
                                                                                  • 23.21.42.25
                                                                                  PO1.xlsxGet hashmaliciousBrowse
                                                                                  • 174.129.214.20
                                                                                  a7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                                  • 54.204.14.42
                                                                                  QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                                  • 50.19.252.36
                                                                                  sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                                  • 54.243.161.145
                                                                                  JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                                  • 174.129.214.20
                                                                                  EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                                  • 174.129.214.20
                                                                                  RVAgYSH2qh.exeGet hashmaliciousBrowse
                                                                                  • 54.235.142.93
                                                                                  yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                                  • 54.225.66.103
                                                                                  T2HDck1Mmy.exeGet hashmaliciousBrowse
                                                                                  • 54.235.142.93
                                                                                  Purchase Order.exeGet hashmaliciousBrowse
                                                                                  • 54.225.66.103
                                                                                  Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                                                                  • 23.21.126.66
                                                                                  phy__1__31629__2649094674__1605642612.exeGet hashmaliciousBrowse
                                                                                  • 23.21.126.66
                                                                                  BBVA confirming Aviso de pago Eur5780201120.exeGet hashmaliciousBrowse
                                                                                  • 54.204.14.42

                                                                                  ASN

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  AMAZON-AESUSmcsrXx9lfD.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  SecuriteInfo.com.Trojan.PackedNET.461.20928.exeGet hashmaliciousBrowse
                                                                                  • 23.21.42.25
                                                                                  Defender-update-kit-x86x64.exeGet hashmaliciousBrowse
                                                                                  • 54.225.153.147
                                                                                  https://largemail.r1.rpost.net/files/7xU97qcFgCvB3Uv1wDC4qvS2ZriLfublohKWA5V3/ln/en-usGet hashmaliciousBrowse
                                                                                  • 54.225.66.103
                                                                                  ORDER.exeGet hashmaliciousBrowse
                                                                                  • 54.235.142.93
                                                                                  http://s1022.t.en25.com/e/er?s=1022&lid=2184&elqTrackId=BEDFF87609C7D9DEAD041308DD8FFFB8&lb_email=bkirwer%40farbestfoods.com&elq=b095bd096fb54161953a2cf8316b5d13&elqaid=3115&elqat=1Get hashmaliciousBrowse
                                                                                  • 52.1.99.77
                                                                                  Bill # 2.xlsxGet hashmaliciousBrowse
                                                                                  • 23.21.42.25
                                                                                  https://ubereats.app.link/cwmLFZfMz5?%243p=a_custom_354088&%24deeplink_path=promo%2Fapply%3FpromoCode%3DRECONFORT7&%24desktop_url=tracking.spectrumemp.com/el?aid=8feeb968-bdd0-11e8-b27f-22000be0a14e&rid=50048635&pid=285843&cid=513&dest=overlordscan.com/cmV0by5tZXR6bGVyQGlzb2x1dGlvbnMuY2g=%23#kkowfocjoyuynaip#Get hashmaliciousBrowse
                                                                                  • 35.170.181.205
                                                                                  BANK ACCOUNT INFO!.exeGet hashmaliciousBrowse
                                                                                  • 107.22.223.163
                                                                                  PO1.xlsxGet hashmaliciousBrowse
                                                                                  • 174.129.214.20
                                                                                  https://rebrand.ly/zkp0yGet hashmaliciousBrowse
                                                                                  • 54.227.164.140
                                                                                  AccountStatements.htmlGet hashmaliciousBrowse
                                                                                  • 18.209.113.162
                                                                                  a7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                                  • 54.204.14.42
                                                                                  QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                                  • 50.19.252.36
                                                                                  sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                                  • 54.243.161.145
                                                                                  JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                                  • 174.129.214.20
                                                                                  EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                                  • 174.129.214.20
                                                                                  RVAgYSH2qh.exeGet hashmaliciousBrowse
                                                                                  • 54.235.142.93
                                                                                  yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                                  • 54.225.66.103
                                                                                  PUBLIC-DOMAIN-REGISTRYUSmcsrXx9lfD.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  fattura.exeGet hashmaliciousBrowse
                                                                                  • 162.222.226.70
                                                                                  Pagamento.exeGet hashmaliciousBrowse
                                                                                  • 162.222.226.70
                                                                                  PO1.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Zahlung.exeGet hashmaliciousBrowse
                                                                                  • 162.222.226.70
                                                                                  0hgHwEkIWY.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  Swift Copy.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Shipping Details_PDF.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  Zahlung.exeGet hashmaliciousBrowse
                                                                                  • 162.222.226.70
                                                                                  Lieferadresse.exeGet hashmaliciousBrowse
                                                                                  • 162.222.226.70
                                                                                  RFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  Order List.xlsxGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  Shipping doc.pdf.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.143
                                                                                  OrV86zxFWHW1j0f.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  XDMBhLJxD1Qf7JW.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  me4qssWAMQ.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.225
                                                                                  Vd58qg0dhp.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.223
                                                                                  15egpuWfT3.exeGet hashmaliciousBrowse
                                                                                  • 208.91.199.224
                                                                                  PO_287104.exeGet hashmaliciousBrowse
                                                                                  • 208.91.198.225

                                                                                  JA3 Fingerprints

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  3b5074b1b5d032e5620f69f9f700ff0emcsrXx9lfD.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  SecuriteInfo.com.Trojan.PackedNET.461.20928.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  ARjQJiNmBs.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  1piS4PBvBp.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  ORDER.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  a7UZzCVWKO.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  QKLQkaCe9M.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  sAPuJAvs52.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  JlgyVmPWZr.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  EIUOzWW2JX.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  yCyc4rN0u8.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  9cXAnovmQX.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  T2HDck1Mmy.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  PO N0.1500243224._PDF.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  zRHI9DJ0YKIPfBX.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  chib(1).exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  dede.exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  obi(1).exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248
                                                                                  frc(1).exeGet hashmaliciousBrowse
                                                                                  • 54.235.83.248

                                                                                  Dropped Files

                                                                                  No context

                                                                                  Created / dropped Files

                                                                                  No created / dropped files found

                                                                                  Static File Info

                                                                                  General

                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.862193874993034
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:yQDGREHA9h.exe
                                                                                  File size:619008
                                                                                  MD5:c11d6124ee0522c7ab71d20cf3474dc0
                                                                                  SHA1:c52a64b7189c762b907a9d727950f3d1364c68ba
                                                                                  SHA256:871a7f14c61157dbea48d27f92bc64097e10eb44a9c8ef7543c435e275ca249c
                                                                                  SHA512:24b4d1776b4ec8610d1fe66a5aa9dc5a2886562e4805e0069e2177a477b272887cb7cd4616f4763814e6ffb6aa456a2b94301289b1fa75bf0585812d1f2a7c40
                                                                                  SSDEEP:12288:U/bH8hDt8CFefzXYQ1pY5ucIaIGnrqhz2VLgBpVy:2ritb6jYQXLGnrqIVkBpV
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q._.................j............... ........@.. ....................................@................................

                                                                                  File Icon

                                                                                  Icon Hash:00828e8e8686b000

                                                                                  Static PE Info

                                                                                  General

                                                                                  Entrypoint:0x4989ce
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                  Time Stamp:0x5FB77181 [Fri Nov 20 07:34:25 2020 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:v4.0.30319
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                  Entrypoint Preview

                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al

                                                                                  Data Directories

                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9897c0x4f.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x242.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x9c0000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                  Sections

                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000x969d40x96a00False0.918117868257data7.8672821185IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x9a0000x2420x400False0.310546875data3.56952524932IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x9c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                  Resources

                                                                                  NameRVASizeTypeLanguageCountry
                                                                                  RT_MANIFEST0x9a0580x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                  Imports

                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain

                                                                                  Network Behavior

                                                                                  Snort IDS Alerts

                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                  11/20/20-20:06:32.344917TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49741587192.168.2.5208.91.199.223

                                                                                  Network Port Distribution

                                                                                  TCP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 20, 2020 20:06:11.505172968 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.608396053 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.608489037 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.647125959 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.750236034 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.750369072 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.750410080 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.750448942 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.750478983 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.750503063 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.750577927 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.751578093 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.793346882 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.794786930 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.898063898 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.949592113 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:11.984927893 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:12.091587067 CET4434974054.235.83.248192.168.2.5
                                                                                  Nov 20, 2020 20:06:12.137196064 CET49740443192.168.2.554.235.83.248
                                                                                  Nov 20, 2020 20:06:16.690968990 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:19.700428009 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:25.700860977 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:25.850434065 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:25.850622892 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:31.426306009 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:31.427443027 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:31.577011108 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:31.577064037 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:31.578993082 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:31.729494095 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:31.730468988 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:31.882184982 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:31.883229971 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.033446074 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:32.033952951 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.192569971 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:32.193068027 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.342849016 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:32.344917059 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.345195055 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.345376015 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.345555067 CET49741587192.168.2.5208.91.199.223
                                                                                  Nov 20, 2020 20:06:32.494697094 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:32.495007038 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:32.592065096 CET58749741208.91.199.223192.168.2.5
                                                                                  Nov 20, 2020 20:06:32.638793945 CET49741587192.168.2.5208.91.199.223

                                                                                  UDP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 20, 2020 20:04:25.752588034 CET6015153192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:04:25.780230045 CET53601518.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:04:26.554780960 CET5696953192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:04:26.581614971 CET53569698.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:04:27.360476971 CET5516153192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:04:27.387553930 CET53551618.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:04:28.428821087 CET5475753192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:04:28.456034899 CET53547578.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:04:36.581324100 CET4999253192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:04:37.468607903 CET53499928.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:04:51.284864902 CET6007553192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:04:51.312041044 CET53600758.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:15.783812046 CET5501653192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:15.819371939 CET53550168.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:16.265669107 CET6434653192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:16.301541090 CET53643468.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:16.538113117 CET5712853192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:16.573874950 CET53571288.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:16.757421017 CET5479153192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:16.793227911 CET53547918.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:17.142254114 CET5046353192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:17.177826881 CET53504638.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:17.503015995 CET5039453192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:17.529995918 CET53503948.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:17.903326035 CET5853053192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:17.923352957 CET5381353192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:17.941055059 CET53585308.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:17.950325012 CET53538138.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:18.350647926 CET6373253192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:18.386336088 CET53637328.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:19.048198938 CET5734453192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:19.075333118 CET53573448.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:19.687962055 CET5445053192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:19.723606110 CET53544508.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:20.040183067 CET5926153192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:20.076396942 CET53592618.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:21.286680937 CET5715153192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:21.330225945 CET53571518.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:24.886931896 CET5941353192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:24.922575951 CET53594138.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:05:52.645276070 CET6051653192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:05:52.673609972 CET53605168.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.409574986 CET5164953192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:06:11.436805964 CET53516498.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:06:11.459436893 CET6508653192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:06:11.486526012 CET53650868.8.8.8192.168.2.5
                                                                                  Nov 20, 2020 20:06:16.647336006 CET5643253192.168.2.58.8.8.8
                                                                                  Nov 20, 2020 20:06:16.686661005 CET53564328.8.8.8192.168.2.5

                                                                                  DNS Queries

                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                  Nov 20, 2020 20:05:21.286680937 CET192.168.2.58.8.8.80x6970Standard query (0)g.msn.comA (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.409574986 CET192.168.2.58.8.8.80x2244Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.459436893 CET192.168.2.58.8.8.80xe2f5Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:16.647336006 CET192.168.2.58.8.8.80x5f1cStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)

                                                                                  DNS Answers

                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                  Nov 20, 2020 20:05:21.330225945 CET8.8.8.8192.168.2.50x6970No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.182.194A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.436805964 CET8.8.8.8192.168.2.50x2244No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com174.129.214.20A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.182.194A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.66.103A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:11.486526012 CET8.8.8.8192.168.2.50xe2f5No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:16.686661005 CET8.8.8.8192.168.2.50x5f1cNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:16.686661005 CET8.8.8.8192.168.2.50x5f1cNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:16.686661005 CET8.8.8.8192.168.2.50x5f1cNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                                                                  Nov 20, 2020 20:06:16.686661005 CET8.8.8.8192.168.2.50x5f1cNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)

                                                                                  HTTPS Packets

                                                                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                                  Nov 20, 2020 20:06:11.751578093 CET54.235.83.248443192.168.2.549740CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                                  CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                                                                  CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                                                                  SMTP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                                  Nov 20, 2020 20:06:31.426306009 CET58749741208.91.199.223192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                                  Nov 20, 2020 20:06:31.427443027 CET49741587192.168.2.5208.91.199.223EHLO 116938
                                                                                  Nov 20, 2020 20:06:31.577064037 CET58749741208.91.199.223192.168.2.5250-us2.outbound.mailhostbox.com
                                                                                  250-PIPELINING
                                                                                  250-SIZE 41648128
                                                                                  250-VRFY
                                                                                  250-ETRN
                                                                                  250-STARTTLS
                                                                                  250-AUTH PLAIN LOGIN
                                                                                  250-AUTH=PLAIN LOGIN
                                                                                  250-ENHANCEDSTATUSCODES
                                                                                  250-8BITMIME
                                                                                  250 DSN
                                                                                  Nov 20, 2020 20:06:31.578993082 CET49741587192.168.2.5208.91.199.223AUTH login cGV0ZXIudGVya3BlckBnaC13aWxtYXItaW50bC5jb20=
                                                                                  Nov 20, 2020 20:06:31.729494095 CET58749741208.91.199.223192.168.2.5334 UGFzc3dvcmQ6
                                                                                  Nov 20, 2020 20:06:31.882184982 CET58749741208.91.199.223192.168.2.5235 2.7.0 Authentication successful
                                                                                  Nov 20, 2020 20:06:31.883229971 CET49741587192.168.2.5208.91.199.223MAIL FROM:<peter.terkper@gh-wilmar-intl.com>
                                                                                  Nov 20, 2020 20:06:32.033446074 CET58749741208.91.199.223192.168.2.5250 2.1.0 Ok
                                                                                  Nov 20, 2020 20:06:32.033952951 CET49741587192.168.2.5208.91.199.223RCPT TO:<peter.terkper@gh-wilmar-intl.com>
                                                                                  Nov 20, 2020 20:06:32.192569971 CET58749741208.91.199.223192.168.2.5250 2.1.5 Ok
                                                                                  Nov 20, 2020 20:06:32.193068027 CET49741587192.168.2.5208.91.199.223DATA
                                                                                  Nov 20, 2020 20:06:32.342849016 CET58749741208.91.199.223192.168.2.5354 End data with <CR><LF>.<CR><LF>
                                                                                  Nov 20, 2020 20:06:32.345555067 CET49741587192.168.2.5208.91.199.223.
                                                                                  Nov 20, 2020 20:06:32.592065096 CET58749741208.91.199.223192.168.2.5250 2.0.0 Ok: queued as 1C5C51829DD

                                                                                  Code Manipulations

                                                                                  Statistics

                                                                                  Behavior

                                                                                  Click to jump to process

                                                                                  System Behavior

                                                                                  General

                                                                                  Start time:20:04:31
                                                                                  Start date:20/11/2020
                                                                                  Path:C:\Users\user\Desktop\yQDGREHA9h.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:'C:\Users\user\Desktop\yQDGREHA9h.exe'
                                                                                  Imagebase:0x570000
                                                                                  File size:619008 bytes
                                                                                  MD5 hash:C11D6124EE0522C7AB71D20CF3474DC0
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.477175512.0000000004577000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.520044654.0000000000C14000.00000004.00000020.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.529526410.0000000005362000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:20:04:35
                                                                                  Start date:20/11/2020
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Imagebase:0x3f0000
                                                                                  File size:64616 bytes
                                                                                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:moderate

                                                                                  General

                                                                                  Start time:20:04:36
                                                                                  Start date:20/11/2020
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Imagebase:0x250000
                                                                                  File size:64616 bytes
                                                                                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:moderate

                                                                                  General

                                                                                  Start time:20:04:36
                                                                                  Start date:20/11/2020
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Imagebase:0x780000
                                                                                  File size:64616 bytes
                                                                                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.282867614.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.284627865.0000000002AD1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:moderate

                                                                                  General

                                                                                  Start time:20:04:37
                                                                                  Start date:20/11/2020
                                                                                  Path:C:\Users\user\Desktop\yQDGREHA9h.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:'C:\Users\user\Desktop\yQDGREHA9h.exe'
                                                                                  Imagebase:0xc00000
                                                                                  File size:619008 bytes
                                                                                  MD5 hash:C11D6124EE0522C7AB71D20CF3474DC0
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.519501217.000000000129F000.00000004.00000020.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.528900674.0000000005552000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:20:04:42
                                                                                  Start date:20/11/2020
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Imagebase:0xaa0000
                                                                                  File size:64616 bytes
                                                                                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.520499133.0000000002DE5000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.518041346.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.520365632.0000000002D91000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:moderate

                                                                                  Disassembly

                                                                                  Code Analysis

                                                                                  Reset < >