Source: GQKWopXj7S.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: GQKWopXj7S.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002B38000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002B4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002B38000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2505028154.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: GQKWopXj7S.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002A71000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002B38000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: GQKWopXj7S.exe | String found in binary or memory: http://tempuri.org/DataSet1.xsd |
Source: GQKWopXj7S.exe, 00000000.00000002.2505028154.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, GQKWopXj7S.exe, 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp | String found in binary or memory: https://account.dyn.com/ |
Source: GQKWopXj7S.exe | String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: 0.2.GQKWopXj7S.exe.70c0000.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.GQKWopXj7S.exe.70c0000.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.GQKWopXj7S.exe.3a79970.0.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.GQKWopXj7S.exe.3a79970.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_01083E40 | 0_2_01083E40 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_01086F98 | 0_2_01086F98 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_0108DE6C | 0_2_0108DE6C |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_028E2410 | 0_2_028E2410 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_06F39728 | 0_2_06F39728 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_06F392F0 | 0_2_06F392F0 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_06F38E85 | 0_2_06F38E85 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_06F3AE00 | 0_2_06F3AE00 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_06F3A9C8 | 0_2_06F3A9C8 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_0721CA20 | 0_2_0721CA20 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_07214EC8 | 0_2_07214EC8 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_07218438 | 0_2_07218438 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_0721BC78 | 0_2_0721BC78 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_07210040 | 0_2_07210040 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_07210C58 | 0_2_07210C58 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_07210388 | 0_2_07210388 |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Code function: 0_2_0721DAD8 | 0_2_0721DAD8 |
Source: GQKWopXj7S.exe, 00000000.00000000.1259322114.000000000069E000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameBjGx.exeB vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe, 00000000.00000002.2507494971.0000000007790000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMontero.dll8 vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe, 00000000.00000002.2503533587.0000000002A71000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe, 00000000.00000002.2506229379.00000000054C0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameTL.dll" vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe, 00000000.00000002.2501540677.0000000000BBE000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe, 00000000.00000002.2505028154.0000000003A71000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename2ef0ab37-7f3e-4594-af6b-a038ff0febc5.exe4 vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe, 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename2ef0ab37-7f3e-4594-af6b-a038ff0febc5.exe4 vs GQKWopXj7S.exe |
Source: GQKWopXj7S.exe | Binary or memory string: OriginalFilenameBjGx.exeB vs GQKWopXj7S.exe |
Source: 0.2.GQKWopXj7S.exe.70c0000.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.GQKWopXj7S.exe.70c0000.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.GQKWopXj7S.exe.3a79970.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.GQKWopXj7S.exe.3a79970.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, cPs8D.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, 72CF8egH.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, G5CXsdn.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, 3uPsILA6U.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, 6oQOw74dfIt.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, aMIWm.cs | Cryptographic APIs: 'CreateDecryptor', 'TransformBlock' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, 3QjbQ514BDx.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, 3QjbQ514BDx.cs | Cryptographic APIs: 'TransformFinalBlock' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, kCtW2ldAEV6qDsFo0b.cs | Security API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity) |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, kCtW2ldAEV6qDsFo0b.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, kCtW2ldAEV6qDsFo0b.cs | Security API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule) |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, CM9ccjlVnUeJlxeSTY.cs | Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, CM9ccjlVnUeJlxeSTY.cs | Security API names: System.Security.Principal.WindowsIdentity.GetCurrent() |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: riched20.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: usp10.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, jVhtRnXZc1UunVsU6O.cs | High entropy of concatenated method names: 'Tawb3uMxw', 'myGJxoALm', 'zisRtcMfx', 'cTHTlDaE4', 'T3f2rcxCQ', 'lmGfry0nC', 'ojf8e5dali6hQPaufv', 'EiG7DpGH3PMChef1eA', 'GWulj7IoW', 'kAEsvUiNQ' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, xr2UG0aXHrZnHCQd39.cs | High entropy of concatenated method names: 'TOmwJhGNd4', 'ljxwR3GH9s', 'dRUwctFEnu', 'JKBw23G6KK', 'iYJwCyV9Np', 'QFJwuqF2V8', 'ofLwaa5fRH', 'G2dwltl0TV', 'kY6wDxlo5A', 'isvwsdYCGs' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, DNBDXQCTCt7l3TL1Pcu.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'eNG8DZNPE8', 'Yaa8sMUilG', 'MmB8qOC1j2', 'CKg88RcFxw', 'F9h8o0MJrO', 'Jtx8Os2s86', 'pC98vAVPOH' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, CM9ccjlVnUeJlxeSTY.cs | High entropy of concatenated method names: 'nWvK3O2K9H', 'waeKSDD5CO', 'GgNKBLF5a9', 'ndAKQGaQeX', 'uwZKGVqTyr', 'PEhKVxWAvr', 'bxAKkwXFEu', 'oaMK6mpYgX', 'toCKiFO52h', 'uLFKye2XQM' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, QvvipNFjX83HIkTDnX.cs | High entropy of concatenated method names: 'Dispose', 'CCKPiBCjHq', 'TbJ1Fv5mVl', 'll88Gv5saj', 'mINPyOavbg', 'qP1PzZ6QmM', 'ProcessDialogKey', 'sxJ1InSf5c', 'VcJ1PpUMbM', 'SCr11NKV8h' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, buPOruJjiSCmG1rVQI.cs | High entropy of concatenated method names: 'wZ7DLPiMQ7', 'OqnDFXpIpd', 'E3eDnDeXcI', 'ppGDh8njM5', 'f8iDE2ipvh', 'SvnDZCe8yQ', 'qusD5IKFGx', 'HZoDWG67ox', 'ovWD9aA42F', 'Vb2D0AaMwO' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, c84fuD5Cjcbf1VkubO.cs | High entropy of concatenated method names: 'A0yYcFJwdC', 'v7dY2A69u0', 'wP3YLOfRup', 'XjhYF4M3of', 'uBQYhnwFYQ', 'GbZYE4hyCl', 'atSY5gXNWM', 'QitYWMxJSP', 'k1tY0r5CDJ', 'd06Yd5numw' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, vXmbZCPkoncVrFegGk.cs | High entropy of concatenated method names: 'CbWaxf0blR', 'rYta41yS9q', 'ToString', 'lxqag3OZeE', 'OwWaK6Rw2c', 'bxmawaLLMt', 'Y67aUW6pjS', 'xqsajKWXr5', 'mN7apyou9G', 'KiIaMwACEt' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, bH5pYsIOqZcXxeVGdB.cs | High entropy of concatenated method names: 'bxRDCWn7Z5', 'LnTDaODs7P', 'nh1DDegL74', 'HNUDqiDeqT', 'rutDohncND', 'ACuDv1qbCW', 'Dispose', 'kfIlg4yimc', 'KrLlKfGOXh', 'T3dlwZv0XU' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, do3YSAQ7PoXbjqCnnH.cs | High entropy of concatenated method names: 'oErswU7KVR', 'ufPsUekdGA', 'YsCsjXV2n0', 'MM5spdoDxq', 'IH1sDopQa7', 'QCbsMnNk2s', 'Next', 'Next', 'Next', 'NextBytes' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, GdBN7pGpb0BbAyscbp.cs | High entropy of concatenated method names: 'YZxj7Yioem', 'pEtjKOp7OW', 'C3OjUHGCMV', 'kF2jpFiQuw', 'Pv4jMF31kc', 'TrcUGXfru7', 'awGUVQsHEn', 'bu9Uk0q5ZJ', 'VpGU67QOC6', 'GJZUidjj02' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, KK8N2oCEXc3svYNqJKO.cs | High entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'WHmsdwib7b', 'jijsmqlZFn', 'uGdsA5iTI1', 'IxIs3Vb3bL', 'q8XsS9tVk3', 'RA2sBk7IfN', 'j0ksQAbRHt' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, Dp2VqsTXFLEGOOm7Qd.cs | High entropy of concatenated method names: 'I1RPpWfS7c', 'CfpPMVdOYp', 'KshPxyTxFI', 'ciXP4QulQp', 'VUAPCI6dcP', 'Hq3PubtmYJ', 'HDwClQYpNBMH6wyDoj', 'JrjEDH2gN9pLqDUbcr', 'tk4PPmmweQ', 'Y3XPtcPKTT' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, PhFI0gCC3m3fXFN8MC4.cs | High entropy of concatenated method names: 'kLqsyjPQ6i', 'X6VszvuRvf', 'iTtqIS672F', 'WKPqPu6gDd', 'VtTq1LuuGc', 'IJ5qtvLxqc', 'rAKqHABnDB', 'bigq77PolP', 'v9Cqgd5I5X', 'kBEqKdvfnq' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, QlQQ8b01PPiXSYiFjq.cs | High entropy of concatenated method names: 'WhQUrxWbci', 'RpGUTdKZQK', 'y8LwnRANFP', 'R6Awh1NQgH', 'bUEwE67dX3', 'QUHwZpCoIb', 'tqvw5nUCJj', 'JqNwWduQdX', 'w3sw9wWdN8', 'T00w0iqXjM' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, NsJPZr8Xuy1IqP8Cf7.cs | High entropy of concatenated method names: 'MXKpXEptSO', 'oPApNx4BZb', 'taZpbYIduW', 'WkLpJnvhaA', 'pbAprvTnAb', 'UdmpRdXuq2', 'S8ppT5HCu9', 'woQpckD0EJ', 'BNNp2E7KSu', 'qbvpffLlpO' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, KOTL5u4JSHhbqVvEW9.cs | High entropy of concatenated method names: 'bPIC0kRiTN', 'u6oCmGvslF', 'OPEC3bmDeo', 'Hv6CS4NnQu', 'qwoCFSJMS7', 'AhwCnjFRUb', 'ONBChvWusy', 'kq1CEgZpMS', 'XhFCZOlOua', 'PXGC5K4Ks0' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, QrfBbZsy2OrC30SjKX.cs | High entropy of concatenated method names: 'pkJpgcareK', 'yXEpwqlUQv', 't97pjZ5uiH', 'Vq2jyOq1DO', 'DCFjzQxXnL', 'kZSpI2yDJQ', 'bWnpPc93ol', 'PTEp1vlZZI', 'dAhptGuluZ', 'Ao8pHiJ0nv' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, H6vxdFLBKv1XUpsw7b.cs | High entropy of concatenated method names: 'SpVa6jo6D2', 'vF2ayA5cVg', 'p8olIISri2', 'tVylPSSuEu', 'jhnadsbJwK', 'mcJamtktOs', 'qfLaA9ukye', 'ReAa3x4Ulj', 'tyhaSlFn10', 'fx8aBKAk0y' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, kCtW2ldAEV6qDsFo0b.cs | High entropy of concatenated method names: 'UOkt71gy1U', 't3stgbk8kw', 'PP8tKoJUf8', 'pAktw3XB4C', 'ejgtUYJpHP', 'gv8tjWvGQB', 'dtItp6e1FG', 'uLPtMi301J', 'jPdteWtVPM', 'yiytxMRxCU' |
Source: 0.2.GQKWopXj7S.exe.7790000.4.raw.unpack, x7Yn0YzQYtMKr66ENK.cs | High entropy of concatenated method names: 'K11sRGfPbx', 'fNsscOByPc', 'xW8s2FrThc', 'NcksLT82OR', 'zVFsF0bsU6', 'YsPsheiZU1', 'DwMsEC3bFd', 'SXfsvtYYJm', 'fHWsXpPybr', 'uhdsNUWAMH' |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Users\user\Desktop\GQKWopXj7S.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\GQKWopXj7S.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.70c0000.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.70c0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3ab5990.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3a79970.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3a79970.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2505028154.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: GQKWopXj7S.exe PID: 6796, type: MEMORYSTR |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.70c0000.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.70c0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3ab5990.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3a79970.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3a79970.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2505028154.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2503533587.0000000002AC7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: GQKWopXj7S.exe PID: 6796, type: MEMORYSTR |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.70c0000.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.70c0000.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3ab5990.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3ab5990.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3a79970.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.GQKWopXj7S.exe.3a79970.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2507162380.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2505028154.0000000003A71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: GQKWopXj7S.exe PID: 6796, type: MEMORYSTR |