Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003403000.00000004.00000800.00020000.00000000.sdmp, NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033EF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://45.137.22.234:55615 |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://45.137.22.234:55615/ |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003441000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.ip.sb |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003441000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://api.ip.sb.cdn.cloudflare.net |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003403000.00000004.00000800.00020000.00000000.sdmp, NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033EF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003403000.00000004.00000800.00020000.00000000.sdmp, NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003410000.00000004.00000800.00020000.00000000.sdmp, NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/0 |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/ |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033EF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnect |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectLR |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.00000000033EF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/CheckConnectT |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003403000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsLR |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLR |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentLR |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLR |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003351000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003410000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb |
Source: NWzeEUBQ7F.exe, 00000003.00000002.2143761709.0000000003410000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/geoip |
Source: NWzeEUBQ7F.exe, NWzeEUBQ7F.exe, 00000003.00000002.2142435235.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE% |
Source: NWzeEUBQ7F.exe, NWzeEUBQ7F.exe, 00000003.00000002.2142435235.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg |
Source: NWzeEUBQ7F.exe, NWzeEUBQ7F.exe, 00000003.00000002.2142435235.0000000000402000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/ip%appdata% |
Source: 3.2.NWzeEUBQ7F.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 3.2.NWzeEUBQ7F.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 3.2.NWzeEUBQ7F.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.NWzeEUBQ7F.exe.34a2050.3.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.NWzeEUBQ7F.exe.34a2050.3.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 0.2.NWzeEUBQ7F.exe.34a2050.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.NWzeEUBQ7F.exe.348a230.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.NWzeEUBQ7F.exe.348a230.1.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 0.2.NWzeEUBQ7F.exe.348a230.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.NWzeEUBQ7F.exe.34a2050.3.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.NWzeEUBQ7F.exe.34a2050.3.raw.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 0.2.NWzeEUBQ7F.exe.34a2050.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.NWzeEUBQ7F.exe.348a230.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.NWzeEUBQ7F.exe.348a230.1.raw.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 0.2.NWzeEUBQ7F.exe.348a230.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, type: UNPACKEDPE | Matched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 00000003.00000002.2142435235.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 00000000.00000002.2055676867.0000000003469000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: 00000000.00000002.2055676867.0000000003CC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: Process Memory Space: NWzeEUBQ7F.exe PID: 6596, type: MEMORYSTR | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: Process Memory Space: NWzeEUBQ7F.exe PID: 6948, type: MEMORYSTR | Matched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Section loaded: userenv.dll | Jump to behavior |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, TFryqKyrxWQOPHqCaSA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rk7YjDKc1N', 'soaYTGZ4TY', 'nrxYWxNayC', 'idfYG3gKQS', 'Fp2YZE1BjE', 'TqvYaxCwg6', 'QmWY3QcjW2' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, Sm2jPM48AhSiYIjeqb.cs | High entropy of concatenated method names: 'kC1HhlR6g1', 'rNQHuPxCgW', 'qDOHEOdj8q', 'Fl1HqAoFkj', 'daKHKSN89m', 'JESHNp7oB1', 'p7bHiR0G2U', 'oGiHn9QXjt', 'aPiHJSowag', 'qjsHPfAxAR' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, zoTArIDcKT3oP9urIa.cs | High entropy of concatenated method names: 'PAMyHCUdiB', 'Su1yfqK7r4', 'sesy2TVq5B', 'EFcyxA2nDM', 'vuuy91CNrS', 'T3byoAkFIu', 'IaybC2NyBLPSXEKnyj', 'dtnMAD7t4PQBe7WQny', 'PSUyy0iEQV', 'MYJyIaBQJW' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, AZWgtBJesTVq5BJFcA.cs | High entropy of concatenated method names: 'lPqCq2v35k', 'HoUCNGuXek', 'iiACnkip2j', 'kwNCJDOsb2', 'aWDC9pVphG', 'PDaCoRKQBc', 'KqtCMVp7AO', 'IniC0q6O1P', 'Y79CBettUd', 'hU9CYSCXpE' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, LP6CAtmIOs9WIMgJ8V.cs | High entropy of concatenated method names: 'rdq6aNdWSJ', 'jhG63KeFDF', 'cN06VXxhg3', 'ToString', 'VdL61wuJ42', 'FSs6Uy5tuO', 'MWxpEiaJhIb3vs7FIRX', 'wFadNZabVpxZKIl3MDJ', 'IhuVgsaknvbRxrEAySh', 'Vw8IYAaLCfMga5sJano' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, qCUdiBnau1qK7r4CFY.cs | High entropy of concatenated method names: 'PpIsGHPjIe', 'GZIsZkDRmW', 'h0isaVXHyL', 'pbLs387XAb', 'sFAsVBN9j5', 'pmbs1sZqXh', 'Xg1sUwOtpj', 'LU1spSJwaB', 'Jn1s5aZqjy', 'j40svAShnO' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, FB4l9kW2y1kJG1GdpM.cs | High entropy of concatenated method names: 'LlscnCCyxP', 'eDXcJnyp0Z', 'lcEcSWkcTY', 'fB3cd2AtUr', 'ulUcXnRSZT', 'UXycLDfBC3', 'vaDc7KdeWE', 'VVZckGM8Ap', 'jp8cw1ZL4V', 'gI3cj0o8ma' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, SCPvt2eQNe3nJGC18B.cs | High entropy of concatenated method names: 'aNQEvcArG', 'ySUqN522M', 'nAONk0HIh', 'p9mi9aqaI', 'F3eJFxyvg', 'SUXPyQ1Tv', 'Bxm79kxVQfVGXxwe1f', 'tPetJ9iCZKlMAsq3kq', 'Umm0nHL8Z', 'txJYnvkRx' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, Q34OKbf2V9JB3Qycci.cs | High entropy of concatenated method names: 'NbKIRQBAbM', 'IMLIbyhtl6', 'sqxIssxbH2', 't3VIC9pqsT', 'kSJIQXt9rA', 'QldI6gWROO', 'jFyIHRNOl1', 'GjZIfGYsX0', 'QGYIALwCum', 'kE4I2O3rdc' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, JLIwNtsmKhtlC8qMeJ.cs | High entropy of concatenated method names: 'Dispose', 'Kvhy5MNTMm', 'URbedSoWtA', 'KEgdobsUPD', 'fGGyvU04pn', 'rQWyzBHfKB', 'ProcessDialogKey', 'ykUerChEM6', 'y6IeyBgBcm', 'Ob9eelIhc3' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, WTPJsyyeJvKYpY4Qyii.cs | High entropy of concatenated method names: 'ToString', 'CAignoh3Vl', 'E5tgJWT0Ho', 'rblgPlmovZ', 'AAogSy7S1C', 'kL0gd425JB', 'Lw0glJ1EcV', 'L8cgXY962Z', 'Qkrriur77aVYCMo5FHF', 'z3lgVkruvgUIFEpbB0P' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, KjycDEyDC6IJ4A0rDRo.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YpJ8BDbYU8', 'CUV8Y1PoSt', 'jJe8gK70Iu', 'Jc988lDAay', 'fn28OTmMeH', 'xil8F1AWgr', 'gLv8tbK3aN' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, WChEM65u6IBgBcmjb9.cs | High entropy of concatenated method names: 'bXlBS0SLKq', 'AhrBdxmWvD', 'j5mBln9x59', 'npNBXSDtL1', 'YSTBLvygPU', 'OnDBm3PpNc', 'RWjB7w6f3G', 'PGhBkyIoMu', 'SNYB4rgIJA', 'N1pBwX0iwZ' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, HIhc3ZvE3JnCXAgBN0.cs | High entropy of concatenated method names: 'xs5YCWkp1B', 'MLKYQy7ZG2', 'mGVY61QHSu', 'meZYHDd0p6', 'vBPYBerNTD', 'cNEYfOgg4G', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, cUiRVfGJgL7arru56p.cs | High entropy of concatenated method names: 'RiF9wWJTF6', 'hvd9TNr6oN', 'mpS9GefNse', 'EPy9ZFIyXt', 'CQ89dOJwHe', 'Vlf9l2fHtH', 'Le89XNES9c', 'rTt9LEFvTW', 'eu29mtDhuw', 'sgj974w6tq' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, BrSa3bSAkFIu5WcXRN.cs | High entropy of concatenated method names: 'Md36R2iYFo', 'eEV6sVFjwL', 'y0Q6QmIkok', 'O1j6H9UYJU', 'pmj6fiAtjt', 'hutQV9LQpA', 'KX8Q15BeRU', 'ocGQUa0uAC', 'qT2Qp47DJS', 'S1OQ5vZYV3' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, IwvvmMUkpmvhMNTMms.cs | High entropy of concatenated method names: 'PwcB9De2FF', 'zE0BMfagn6', 'p2FBBEWojw', 'OfqBgqnXqO', 'ePtBOyH69G', 'zbaBtD875D', 'Dispose', 'C7V0bY5hkD', 'boW0sVW2oD', 'ta50CTySqT' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, C40ewydlBEnYIQEvDU.cs | High entropy of concatenated method names: 'BHeFdOacp0gBwYjZyIl', 'mfMWoUaYSttRqu0uLR5', 'qfo60os2Ai', 'jmk6BV3CQw', 'VOk6YSbk3f', 'tgwGKRaRZEZxDch572H', 'BbuKZuaVCvq3EYHrp1v' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, qUYFws3BxZxAqcMQEv.cs | High entropy of concatenated method names: 'kW1M2ap40v', 'owbMxOH683', 'ToString', 'dQmMbGZ2B9', 'FSIMsUOaSc', 'sTXMCPb7Aq', 'MhdMQrHjJ2', 't8tM67bqCk', 'WkEMHwykJR', 'X2YMfZfwNQ' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, vJ23joyywpcRLfBqnmH.cs | High entropy of concatenated method names: 'njSYvF36ke', 'lyGYzLgKmg', 'vT0grCVFad', 'hnZgy69lws', 'Ioqge3D4jM', 'AorgIgEM2Y', 'dVcgDGpPQ8', 'yrBgRB4gao', 'umsgbqg0pr', 'IiOgsXSPkd' |
Source: 0.2.NWzeEUBQ7F.exe.9c50000.5.raw.unpack, M8poHS1oFTq1kvs7E5.cs | High entropy of concatenated method names: 'c52MpvDm3r', 'qskMvg7GgG', 'bbM0rcPBSa', 'VW70yJ6Hgb', 'mDnMjc81yu', 'epTMTqlxbl', 'VxCMWXZVNd', 'O7ZMGUPo1W', 'KhgMZe3cPv', 'OjVMaLgtZZ' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, TFryqKyrxWQOPHqCaSA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rk7YjDKc1N', 'soaYTGZ4TY', 'nrxYWxNayC', 'idfYG3gKQS', 'Fp2YZE1BjE', 'TqvYaxCwg6', 'QmWY3QcjW2' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, Sm2jPM48AhSiYIjeqb.cs | High entropy of concatenated method names: 'kC1HhlR6g1', 'rNQHuPxCgW', 'qDOHEOdj8q', 'Fl1HqAoFkj', 'daKHKSN89m', 'JESHNp7oB1', 'p7bHiR0G2U', 'oGiHn9QXjt', 'aPiHJSowag', 'qjsHPfAxAR' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, zoTArIDcKT3oP9urIa.cs | High entropy of concatenated method names: 'PAMyHCUdiB', 'Su1yfqK7r4', 'sesy2TVq5B', 'EFcyxA2nDM', 'vuuy91CNrS', 'T3byoAkFIu', 'IaybC2NyBLPSXEKnyj', 'dtnMAD7t4PQBe7WQny', 'PSUyy0iEQV', 'MYJyIaBQJW' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, AZWgtBJesTVq5BJFcA.cs | High entropy of concatenated method names: 'lPqCq2v35k', 'HoUCNGuXek', 'iiACnkip2j', 'kwNCJDOsb2', 'aWDC9pVphG', 'PDaCoRKQBc', 'KqtCMVp7AO', 'IniC0q6O1P', 'Y79CBettUd', 'hU9CYSCXpE' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, LP6CAtmIOs9WIMgJ8V.cs | High entropy of concatenated method names: 'rdq6aNdWSJ', 'jhG63KeFDF', 'cN06VXxhg3', 'ToString', 'VdL61wuJ42', 'FSs6Uy5tuO', 'MWxpEiaJhIb3vs7FIRX', 'wFadNZabVpxZKIl3MDJ', 'IhuVgsaknvbRxrEAySh', 'Vw8IYAaLCfMga5sJano' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, qCUdiBnau1qK7r4CFY.cs | High entropy of concatenated method names: 'PpIsGHPjIe', 'GZIsZkDRmW', 'h0isaVXHyL', 'pbLs387XAb', 'sFAsVBN9j5', 'pmbs1sZqXh', 'Xg1sUwOtpj', 'LU1spSJwaB', 'Jn1s5aZqjy', 'j40svAShnO' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, FB4l9kW2y1kJG1GdpM.cs | High entropy of concatenated method names: 'LlscnCCyxP', 'eDXcJnyp0Z', 'lcEcSWkcTY', 'fB3cd2AtUr', 'ulUcXnRSZT', 'UXycLDfBC3', 'vaDc7KdeWE', 'VVZckGM8Ap', 'jp8cw1ZL4V', 'gI3cj0o8ma' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, SCPvt2eQNe3nJGC18B.cs | High entropy of concatenated method names: 'aNQEvcArG', 'ySUqN522M', 'nAONk0HIh', 'p9mi9aqaI', 'F3eJFxyvg', 'SUXPyQ1Tv', 'Bxm79kxVQfVGXxwe1f', 'tPetJ9iCZKlMAsq3kq', 'Umm0nHL8Z', 'txJYnvkRx' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, Q34OKbf2V9JB3Qycci.cs | High entropy of concatenated method names: 'NbKIRQBAbM', 'IMLIbyhtl6', 'sqxIssxbH2', 't3VIC9pqsT', 'kSJIQXt9rA', 'QldI6gWROO', 'jFyIHRNOl1', 'GjZIfGYsX0', 'QGYIALwCum', 'kE4I2O3rdc' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, JLIwNtsmKhtlC8qMeJ.cs | High entropy of concatenated method names: 'Dispose', 'Kvhy5MNTMm', 'URbedSoWtA', 'KEgdobsUPD', 'fGGyvU04pn', 'rQWyzBHfKB', 'ProcessDialogKey', 'ykUerChEM6', 'y6IeyBgBcm', 'Ob9eelIhc3' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, WTPJsyyeJvKYpY4Qyii.cs | High entropy of concatenated method names: 'ToString', 'CAignoh3Vl', 'E5tgJWT0Ho', 'rblgPlmovZ', 'AAogSy7S1C', 'kL0gd425JB', 'Lw0glJ1EcV', 'L8cgXY962Z', 'Qkrriur77aVYCMo5FHF', 'z3lgVkruvgUIFEpbB0P' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, KjycDEyDC6IJ4A0rDRo.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YpJ8BDbYU8', 'CUV8Y1PoSt', 'jJe8gK70Iu', 'Jc988lDAay', 'fn28OTmMeH', 'xil8F1AWgr', 'gLv8tbK3aN' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, WChEM65u6IBgBcmjb9.cs | High entropy of concatenated method names: 'bXlBS0SLKq', 'AhrBdxmWvD', 'j5mBln9x59', 'npNBXSDtL1', 'YSTBLvygPU', 'OnDBm3PpNc', 'RWjB7w6f3G', 'PGhBkyIoMu', 'SNYB4rgIJA', 'N1pBwX0iwZ' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, HIhc3ZvE3JnCXAgBN0.cs | High entropy of concatenated method names: 'xs5YCWkp1B', 'MLKYQy7ZG2', 'mGVY61QHSu', 'meZYHDd0p6', 'vBPYBerNTD', 'cNEYfOgg4G', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, cUiRVfGJgL7arru56p.cs | High entropy of concatenated method names: 'RiF9wWJTF6', 'hvd9TNr6oN', 'mpS9GefNse', 'EPy9ZFIyXt', 'CQ89dOJwHe', 'Vlf9l2fHtH', 'Le89XNES9c', 'rTt9LEFvTW', 'eu29mtDhuw', 'sgj974w6tq' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, BrSa3bSAkFIu5WcXRN.cs | High entropy of concatenated method names: 'Md36R2iYFo', 'eEV6sVFjwL', 'y0Q6QmIkok', 'O1j6H9UYJU', 'pmj6fiAtjt', 'hutQV9LQpA', 'KX8Q15BeRU', 'ocGQUa0uAC', 'qT2Qp47DJS', 'S1OQ5vZYV3' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, IwvvmMUkpmvhMNTMms.cs | High entropy of concatenated method names: 'PwcB9De2FF', 'zE0BMfagn6', 'p2FBBEWojw', 'OfqBgqnXqO', 'ePtBOyH69G', 'zbaBtD875D', 'Dispose', 'C7V0bY5hkD', 'boW0sVW2oD', 'ta50CTySqT' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, C40ewydlBEnYIQEvDU.cs | High entropy of concatenated method names: 'BHeFdOacp0gBwYjZyIl', 'mfMWoUaYSttRqu0uLR5', 'qfo60os2Ai', 'jmk6BV3CQw', 'VOk6YSbk3f', 'tgwGKRaRZEZxDch572H', 'BbuKZuaVCvq3EYHrp1v' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, qUYFws3BxZxAqcMQEv.cs | High entropy of concatenated method names: 'kW1M2ap40v', 'owbMxOH683', 'ToString', 'dQmMbGZ2B9', 'FSIMsUOaSc', 'sTXMCPb7Aq', 'MhdMQrHjJ2', 't8tM67bqCk', 'WkEMHwykJR', 'X2YMfZfwNQ' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, vJ23joyywpcRLfBqnmH.cs | High entropy of concatenated method names: 'njSYvF36ke', 'lyGYzLgKmg', 'vT0grCVFad', 'hnZgy69lws', 'Ioqge3D4jM', 'AorgIgEM2Y', 'dVcgDGpPQ8', 'yrBgRB4gao', 'umsgbqg0pr', 'IiOgsXSPkd' |
Source: 0.2.NWzeEUBQ7F.exe.3e9f5d0.2.raw.unpack, M8poHS1oFTq1kvs7E5.cs | High entropy of concatenated method names: 'c52MpvDm3r', 'qskMvg7GgG', 'bbM0rcPBSa', 'VW70yJ6Hgb', 'mDnMjc81yu', 'epTMTqlxbl', 'VxCMWXZVNd', 'O7ZMGUPo1W', 'KhgMZe3cPv', 'OjVMaLgtZZ' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, TFryqKyrxWQOPHqCaSA.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rk7YjDKc1N', 'soaYTGZ4TY', 'nrxYWxNayC', 'idfYG3gKQS', 'Fp2YZE1BjE', 'TqvYaxCwg6', 'QmWY3QcjW2' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, Sm2jPM48AhSiYIjeqb.cs | High entropy of concatenated method names: 'kC1HhlR6g1', 'rNQHuPxCgW', 'qDOHEOdj8q', 'Fl1HqAoFkj', 'daKHKSN89m', 'JESHNp7oB1', 'p7bHiR0G2U', 'oGiHn9QXjt', 'aPiHJSowag', 'qjsHPfAxAR' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, zoTArIDcKT3oP9urIa.cs | High entropy of concatenated method names: 'PAMyHCUdiB', 'Su1yfqK7r4', 'sesy2TVq5B', 'EFcyxA2nDM', 'vuuy91CNrS', 'T3byoAkFIu', 'IaybC2NyBLPSXEKnyj', 'dtnMAD7t4PQBe7WQny', 'PSUyy0iEQV', 'MYJyIaBQJW' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, AZWgtBJesTVq5BJFcA.cs | High entropy of concatenated method names: 'lPqCq2v35k', 'HoUCNGuXek', 'iiACnkip2j', 'kwNCJDOsb2', 'aWDC9pVphG', 'PDaCoRKQBc', 'KqtCMVp7AO', 'IniC0q6O1P', 'Y79CBettUd', 'hU9CYSCXpE' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, LP6CAtmIOs9WIMgJ8V.cs | High entropy of concatenated method names: 'rdq6aNdWSJ', 'jhG63KeFDF', 'cN06VXxhg3', 'ToString', 'VdL61wuJ42', 'FSs6Uy5tuO', 'MWxpEiaJhIb3vs7FIRX', 'wFadNZabVpxZKIl3MDJ', 'IhuVgsaknvbRxrEAySh', 'Vw8IYAaLCfMga5sJano' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, qCUdiBnau1qK7r4CFY.cs | High entropy of concatenated method names: 'PpIsGHPjIe', 'GZIsZkDRmW', 'h0isaVXHyL', 'pbLs387XAb', 'sFAsVBN9j5', 'pmbs1sZqXh', 'Xg1sUwOtpj', 'LU1spSJwaB', 'Jn1s5aZqjy', 'j40svAShnO' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, FB4l9kW2y1kJG1GdpM.cs | High entropy of concatenated method names: 'LlscnCCyxP', 'eDXcJnyp0Z', 'lcEcSWkcTY', 'fB3cd2AtUr', 'ulUcXnRSZT', 'UXycLDfBC3', 'vaDc7KdeWE', 'VVZckGM8Ap', 'jp8cw1ZL4V', 'gI3cj0o8ma' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, SCPvt2eQNe3nJGC18B.cs | High entropy of concatenated method names: 'aNQEvcArG', 'ySUqN522M', 'nAONk0HIh', 'p9mi9aqaI', 'F3eJFxyvg', 'SUXPyQ1Tv', 'Bxm79kxVQfVGXxwe1f', 'tPetJ9iCZKlMAsq3kq', 'Umm0nHL8Z', 'txJYnvkRx' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, Q34OKbf2V9JB3Qycci.cs | High entropy of concatenated method names: 'NbKIRQBAbM', 'IMLIbyhtl6', 'sqxIssxbH2', 't3VIC9pqsT', 'kSJIQXt9rA', 'QldI6gWROO', 'jFyIHRNOl1', 'GjZIfGYsX0', 'QGYIALwCum', 'kE4I2O3rdc' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, JLIwNtsmKhtlC8qMeJ.cs | High entropy of concatenated method names: 'Dispose', 'Kvhy5MNTMm', 'URbedSoWtA', 'KEgdobsUPD', 'fGGyvU04pn', 'rQWyzBHfKB', 'ProcessDialogKey', 'ykUerChEM6', 'y6IeyBgBcm', 'Ob9eelIhc3' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, WTPJsyyeJvKYpY4Qyii.cs | High entropy of concatenated method names: 'ToString', 'CAignoh3Vl', 'E5tgJWT0Ho', 'rblgPlmovZ', 'AAogSy7S1C', 'kL0gd425JB', 'Lw0glJ1EcV', 'L8cgXY962Z', 'Qkrriur77aVYCMo5FHF', 'z3lgVkruvgUIFEpbB0P' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, KjycDEyDC6IJ4A0rDRo.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YpJ8BDbYU8', 'CUV8Y1PoSt', 'jJe8gK70Iu', 'Jc988lDAay', 'fn28OTmMeH', 'xil8F1AWgr', 'gLv8tbK3aN' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, WChEM65u6IBgBcmjb9.cs | High entropy of concatenated method names: 'bXlBS0SLKq', 'AhrBdxmWvD', 'j5mBln9x59', 'npNBXSDtL1', 'YSTBLvygPU', 'OnDBm3PpNc', 'RWjB7w6f3G', 'PGhBkyIoMu', 'SNYB4rgIJA', 'N1pBwX0iwZ' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, HIhc3ZvE3JnCXAgBN0.cs | High entropy of concatenated method names: 'xs5YCWkp1B', 'MLKYQy7ZG2', 'mGVY61QHSu', 'meZYHDd0p6', 'vBPYBerNTD', 'cNEYfOgg4G', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, cUiRVfGJgL7arru56p.cs | High entropy of concatenated method names: 'RiF9wWJTF6', 'hvd9TNr6oN', 'mpS9GefNse', 'EPy9ZFIyXt', 'CQ89dOJwHe', 'Vlf9l2fHtH', 'Le89XNES9c', 'rTt9LEFvTW', 'eu29mtDhuw', 'sgj974w6tq' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, BrSa3bSAkFIu5WcXRN.cs | High entropy of concatenated method names: 'Md36R2iYFo', 'eEV6sVFjwL', 'y0Q6QmIkok', 'O1j6H9UYJU', 'pmj6fiAtjt', 'hutQV9LQpA', 'KX8Q15BeRU', 'ocGQUa0uAC', 'qT2Qp47DJS', 'S1OQ5vZYV3' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, IwvvmMUkpmvhMNTMms.cs | High entropy of concatenated method names: 'PwcB9De2FF', 'zE0BMfagn6', 'p2FBBEWojw', 'OfqBgqnXqO', 'ePtBOyH69G', 'zbaBtD875D', 'Dispose', 'C7V0bY5hkD', 'boW0sVW2oD', 'ta50CTySqT' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, C40ewydlBEnYIQEvDU.cs | High entropy of concatenated method names: 'BHeFdOacp0gBwYjZyIl', 'mfMWoUaYSttRqu0uLR5', 'qfo60os2Ai', 'jmk6BV3CQw', 'VOk6YSbk3f', 'tgwGKRaRZEZxDch572H', 'BbuKZuaVCvq3EYHrp1v' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, qUYFws3BxZxAqcMQEv.cs | High entropy of concatenated method names: 'kW1M2ap40v', 'owbMxOH683', 'ToString', 'dQmMbGZ2B9', 'FSIMsUOaSc', 'sTXMCPb7Aq', 'MhdMQrHjJ2', 't8tM67bqCk', 'WkEMHwykJR', 'X2YMfZfwNQ' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, vJ23joyywpcRLfBqnmH.cs | High entropy of concatenated method names: 'njSYvF36ke', 'lyGYzLgKmg', 'vT0grCVFad', 'hnZgy69lws', 'Ioqge3D4jM', 'AorgIgEM2Y', 'dVcgDGpPQ8', 'yrBgRB4gao', 'umsgbqg0pr', 'IiOgsXSPkd' |
Source: 0.2.NWzeEUBQ7F.exe.3e433b0.0.raw.unpack, M8poHS1oFTq1kvs7E5.cs | High entropy of concatenated method names: 'c52MpvDm3r', 'qskMvg7GgG', 'bbM0rcPBSa', 'VW70yJ6Hgb', 'mDnMjc81yu', 'epTMTqlxbl', 'VxCMWXZVNd', 'O7ZMGUPo1W', 'KhgMZe3cPv', 'OjVMaLgtZZ' |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NWzeEUBQ7F.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |