Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_004065C7 FindFirstFileW,FindClose, | 0_2_004065C7 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_00405996 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00402868 FindFirstFileW, | 0_2_00402868 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_00402868 FindFirstFileW, | 5_2_00402868 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_004065C7 FindFirstFileW,FindClose, | 5_2_004065C7 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 5_2_00405996 |
Source: Payment Summary 2025 11 2.exe | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://apis.google.com |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2978383871.0000000007699000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2946739221.0000000007699000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/ |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2946739221.00000000076D5000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2978383871.0000000007699000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2978449323.00000000076D4000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2946739221.0000000007699000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1yib4SG1oMrk31TRhSrZqC1b5h2AZQ3sj&export=download |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2978383871.0000000007699000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2946739221.0000000007699000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1yib4SG1oMrk31TRhSrZqC1b5h2AZQ3sj&export=downloadA9 |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2978383871.0000000007699000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2946739221.0000000007699000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1yib4SG1oMrk31TRhSrZqC1b5h2AZQ3sj&export=downloadFB |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2978383871.0000000007699000.00000004.00000020.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.2946739221.0000000007699000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://drive.usercontent.google.com/download?id=1yib4SG1oMrk31TRhSrZqC1b5h2AZQ3sj&export=downloadwJ |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ssl.gstatic.com |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394BA000.00000004.00000800.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394C2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google-analytics.com;report-uri |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.googletagmanager.com |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2939994805.00000000076D7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394BA000.00000004.00000800.00020000.00000000.sdmp, Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394C2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3026903233.00000000394CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_0040542B GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard, | 0_2_0040542B |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403359 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 5_2_00403359 |
Source: Payment Summary 2025 11 2.exe, 00000000.00000002.2840719478.000000000046A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamekijev gitanos.exeL vs Payment Summary 2025 11 2.exe |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.2981901207.0000000007713000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMsMpLics.dllj% vs Payment Summary 2025 11 2.exe |
Source: Payment Summary 2025 11 2.exe, 00000005.00000003.3024450271.0000000038FCB000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameClassLibrary1.dll" vs Payment Summary 2025 11 2.exe |
Source: Payment Summary 2025 11 2.exe, 00000005.00000000.2837745130.000000000046A000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenamekijev gitanos.exeL vs Payment Summary 2025 11 2.exe |
Source: Payment Summary 2025 11 2.exe | Binary or memory string: OriginalFilenamekijev gitanos.exeL vs Payment Summary 2025 11 2.exe |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, QI6Jy4WEhefhjRy8hP9.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, QI6Jy4WEhefhjRy8hP9.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, QI6Jy4WEhefhjRy8hP9.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, QI6Jy4WEhefhjRy8hP9.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403359 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 5_2_00403359 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: oleacc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: shfolder.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: napinsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: pnrpnsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: wshbth.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: nlaapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: winrnr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, dS8NLBORQCnVypqC83v.cs | High entropy of concatenated method names: 'BCqOXeTmv9', 'U3pOumGsu4', 'fuIOlTMxKk', 'zixOrHaVXa', 'CkiO8lhY9c', 'JySO0WQdTN', 'ltJO5WQVx9', 'GONOW3oATt', 'aOZOZW4wdH', 'GxEptKaimOF2wqBtrf1' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, HXWgqf7QK37HQ0ZpisZ.cs | High entropy of concatenated method names: 'wWc74tJV3d', 'i0M7tjFvsd', 'xmc7D5UyIb', 'DAQ76jgD5d', 'vKc7YmXJBj', 'qfo7BYhLkc', 'Jvm7yiCJ8F', 'hWa7sdSoWA', 'IqU7kwu7n7', 'Jca73Hjm9o' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, Dc4xUxvOwXRXuWZuBqx.cs | High entropy of concatenated method names: 'G1CvmmDfsR', 'iFtvXHTZZE', 'qv9vuYO6aw', 'pAmvl2BZg2', 'NfGvrmE0A6', 'BP0v8pdobr', 'BGPv0hNxQE', 'y9Iv5XC42W', 'uHgvWmqc8U', 'zU2vZv9sUB' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, QI6Jy4WEhefhjRy8hP9.cs | High entropy of concatenated method names: 'gvLhX3oBubUujS9vuYp', 'NLL83koyt6Wvt33yAhj', 'pgfZkkSeMY', 'vh0ry9Sq2v', 'tmJZg4Dl6V', 'bxiZD4WM21', 'IhOZ6o2txi', 'mOyZS55OA6', 'W6sek53ZPM', 'Uu9WcY71tn' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, U3E6RwN5SaPZeZUlErQ.cs | High entropy of concatenated method names: 'yJoNZ7E45S', 'm2sNvL1Jpg', 'CQmNKvbK7F', 'qaeN2NtOP8', 'iMXN1SIOn4', 'hyFNMf9N6a', 'Mk4N9wG0GL', 'jyTNIWn3VI', 'mxXNQrUQrd', 'kRONbW4oVv' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, o8P76yvvHV5KpUNsml7.cs | High entropy of concatenated method names: 'ogOQ0NcqVg', 'SAhQ5DjcbE', 'vjdQW9CUnK', 'kRLQZbCtQg', 'WEjQvXwYeL', 'QGfQKts7GH', 'JRuQ2fHKGZ', 'hT4vqP4jUa', 'dtRQ1ee6MW', 'CoWQMovtgf' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, BYp4U2Oe5wBDI4goG2T.cs | High entropy of concatenated method names: 'SAkbTlwEevfVN7OfceR', 'firsqowOpF5u7MyABPY', 'lC52Q4wnWMdK6pAtMIY', 'lI2Dh7wfSbAAVvtZHvc', 'IfrcE44OyD', 'eMvcO4ZytH', 'tptcceFFV9', 'QObcnPQgnZ', 'lJ8cfe8ReD', 'IekcCYmCMn' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, dSjLwOOBq5S8xcIDmvy.cs | High entropy of concatenated method names: 'CULufKTteJhl0RuNSew', 'oQVjUkTghxn2qQENTbW', 'Dispose', 'ToString', 'DXcMKrT6ieWNGruyEyf', 'jOEugUTStIEMcl8gjMd', 'QpGiTQhrZpHBs0vbm5Q', 'ssBPNmh8GL8a08qPsUB', 'SFcQmw7yx2', 'gl1QXQWNFG' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, cOa8qNtY5ahAXGWQgN.cs | High entropy of concatenated method names: 'mxADtipSP', 'eS364pa0w', 'LJ9Sp5Wfx', 'me6ahOsMX', 'pV9FcqTsZ', 'C5KqE8v3J', 'q1eiJDFX0', 'uZ0Onrt3u2', 'oQATxfFEE', 'yqoVgFGZX' |
Source: 5.3.Payment Summary 2025 11 2.exe.390d8550.0.raw.unpack, uC0hRMPfPBtRWtAg1mn.cs | High entropy of concatenated method names: 'bXlPP3Ncc7', 'TYjP7Ktb1S', 'yu2PNpEHJA', 'oVMPjQKEyI', 'DE0PGQ9Xi0', 'RZdPLFYhvs', 'qx9PRtiFVD', 't6hPmRQrOD', 'wyNPXVSrKq', 'aPWPue8diN' |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | RDTSC instruction interceptor: First address: 630DD4B second address: 630DD4B instructions: 0x00000000 rdtsc 0x00000002 cmp dl, cl 0x00000004 test bl, cl 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FBE7CBDAE09h 0x0000000a cmp ecx, edx 0x0000000c test edx, eax 0x0000000e inc ebp 0x0000000f cmp ecx, 3D413367h 0x00000015 inc ebx 0x00000016 cmp ah, FFFFFFE3h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | RDTSC instruction interceptor: First address: 484DD4B second address: 484DD4B instructions: 0x00000000 rdtsc 0x00000002 cmp dl, cl 0x00000004 test bl, cl 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FBE7CBEDE49h 0x0000000a cmp ecx, edx 0x0000000c test edx, eax 0x0000000e inc ebp 0x0000000f cmp ecx, 3D413367h 0x00000015 inc ebx 0x00000016 cmp ah, FFFFFFE3h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_004065C7 FindFirstFileW,FindClose, | 0_2_004065C7 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 0_2_00405996 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00402868 FindFirstFileW, | 0_2_00402868 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_00402868 FindFirstFileW, | 5_2_00402868 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_004065C7 FindFirstFileW,FindClose, | 5_2_004065C7 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 5_2_00405996 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, | 5_2_00405996 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Queries volume information: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | Code function: 0_2_00403359 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess, | 0_2_00403359 |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\Payment Summary 2025 11 2.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |