Windows Analysis Report
NewLoaderCracks_1.32.exe

Overview

General Information

Sample name: NewLoaderCracks_1.32.exe
Analysis ID: 1525863
MD5: 957e3773e9346cee687c19fce88b7f4a
SHA1: 86e0dbdf89012c5e2fee9feb0867ce867e8d5a1a
SHA256: 2928f73f9fa919f37465f87f2cec1098c255bb420bc38d245aeb136c6e7f1271
Tags: exeuser-aachum
Infos:

Detection

DCRat
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Check if machine is in data center or colocation facility
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: NewLoaderCracks_1.32.exe Avira: detected
Source: C:\comcontainer\cmd.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\comcontainer\Kr8tZ.vbe Avira: detection malicious, Label: VBS/Runner.VPG
Source: C:\Program Files (x86)\Windows Mail\SurrogateRef.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\comcontainer\SurrogateRef.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Recovery\WmiPrvSE.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files\Windows NT\Idle.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Recovery\csrss.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmp Malware Configuration Extractor: DCRat {"SCRT": "{\"o\":\"~\",\"9\":\"%\",\"v\":\"_\",\"c\":\"#\",\"R\":\"<\",\"j\":\"*\",\"d\":\")\",\"O\":\"^\",\"e\":\".\",\"i\":\"|\",\"J\":\"&\",\"L\":\" \",\"Y\":\"@\",\"m\":\"`\",\"y\":\"$\",\"0\":\"!\",\"V\":\">\",\"E\":\"-\",\"z\":\";\",\"w\":\"(\",\"C\":\",\"}", "PCRT": "{\"l\":\",\",\"Q\":\"<\",\"W\":\"~\",\"R\":\"%\",\"x\":\"$\",\"k\":\"^\",\"V\":\"`\",\"O\":\"!\",\"F\":\")\",\"B\":\"_\",\"9\":\" \",\"U\":\"@\",\"w\":\"*\",\"T\":\">\",\"2\":\"#\",\"e\":\"-\",\"S\":\"|\",\"b\":\"&\",\"n\":\";\",\"Z\":\"(\",\"m\":\".\"}", "TAG": "", "MUTEX": "DCR_MUTEX-G9r8ggR6vHi8ykWN8dgB", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 2, "AUR": 1, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%SystemDrive% - Slow"}, "AS": true, "ASO": false, "AD": false}
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Program Files (x86)\Reference Assemblies\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Program Files (x86)\Windows Mail\SurrogateRef.exe ReversingLabs: Detection: 87%
Source: C:\Program Files (x86)\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe ReversingLabs: Detection: 87%
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Program Files\Windows NT\Idle.exe ReversingLabs: Detection: 87%
Source: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Recovery\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Recovery\WmiPrvSE.exe ReversingLabs: Detection: 87%
Source: C:\Recovery\csrss.exe ReversingLabs: Detection: 87%
Source: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\Windows\CbsTemp\RuntimeBroker.exe ReversingLabs: Detection: 87%
Source: C:\comcontainer\SurrogateRef.exe ReversingLabs: Detection: 87%
Source: C:\comcontainer\SwpTnCnrsAAKjgTAQ.exe ReversingLabs: Detection: 87%
Source: C:\comcontainer\cmd.exe ReversingLabs: Detection: 87%
Source: NewLoaderCracks_1.32.exe ReversingLabs: Detection: 68%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\comcontainer\cmd.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Windows Mail\SurrogateRef.exe Joe Sandbox ML: detected
Source: C:\comcontainer\SurrogateRef.exe Joe Sandbox ML: detected
Source: C:\Recovery\WmiPrvSE.exe Joe Sandbox ML: detected
Source: C:\Program Files\Windows NT\Idle.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Recovery\csrss.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Joe Sandbox ML: detected
Source: NewLoaderCracks_1.32.exe Joe Sandbox ML: detected
Source: NewLoaderCracks_1.32.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\WindowsPowerShell\b85529a8a0a78e Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\Windows NT\Idle.exe Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\Windows NT\6ccacd8608530f Jump to behavior
Source: NewLoaderCracks_1.32.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NewLoaderCracks_1.32.exe
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError, 0_2_0054A5F4
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW, 0_2_0055B8E0
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056AAA8 FindFirstFileExA, 0_2_0056AAA8
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: Joe Sandbox View IP Address: 208.95.112.1 208.95.112.1
Source: Joe Sandbox View ASN Name: TUT-ASUS TUT-ASUS
Source: unknown DNS query: name: ip-api.com
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49803 -> 208.95.112.1:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49828 -> 208.95.112.1:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49852 -> 208.95.112.1:80
Source: Network traffic Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49780 -> 208.95.112.1:80
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: ip-api.com
Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002DC5000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002600000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ip-api.com
Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002DC5000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://ip-api.com/line/?fields=hosting
Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

System Summary

barindex
Source: C:\Windows\SysWOW64\wscript.exe COM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8} Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW, 0_2_0054718C
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Windows\CbsTemp\RuntimeBroker.exe Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Windows\CbsTemp\9e8d7a4ca61bd9 Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054857B 0_2_0054857B
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054407E 0_2_0054407E
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056D00E 0_2_0056D00E
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_005570BF 0_2_005570BF
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00571194 0_2_00571194
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_005602F6 0_2_005602F6
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00543281 0_2_00543281
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054E2A0 0_2_0054E2A0
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00556646 0_2_00556646
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056070E 0_2_0056070E
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056473A 0_2_0056473A
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_005537C1 0_2_005537C1
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_005427E8 0_2_005427E8
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054E8A0 0_2_0054E8A0
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054F968 0_2_0054F968
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00564969 0_2_00564969
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00556A7B 0_2_00556A7B
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00553A3C 0_2_00553A3C
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00560B43 0_2_00560B43
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056CB60 0_2_0056CB60
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00555C77 0_2_00555C77
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00553D6D 0_2_00553D6D
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054ED14 0_2_0054ED14
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055FDFA 0_2_0055FDFA
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054DE6C 0_2_0054DE6C
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054BE13 0_2_0054BE13
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00560F78 0_2_00560F78
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00545F3C 0_2_00545F3C
Source: C:\comcontainer\SurrogateRef.exe Code function: 5_2_00007FFD346634E5 5_2_00007FFD346634E5
Source: C:\comcontainer\SurrogateRef.exe Code function: 5_2_00007FFD34663565 5_2_00007FFD34663565
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 14_2_00007FFD346534E5 14_2_00007FFD346534E5
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 14_2_00007FFD34653565 14_2_00007FFD34653565
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 17_2_00007FFD346734E5 17_2_00007FFD346734E5
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 17_2_00007FFD34673565 17_2_00007FFD34673565
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: String function: 0055E28C appears 35 times
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: String function: 0055ED00 appears 31 times
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: String function: 0055E360 appears 52 times
Source: SurrogateRef.exe.0.dr Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: csrss.exe.5.dr Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: NewLoaderCracks_1.32.exe, 00000000.00000003.2149562920.0000000005338000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamelibGLESv2.dll4 vs NewLoaderCracks_1.32.exe
Source: NewLoaderCracks_1.32.exe, 00000000.00000003.2150032734.00000000052B1000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenamelibGLESv2.dll4 vs NewLoaderCracks_1.32.exe
Source: NewLoaderCracks_1.32.exe Binary or memory string: OriginalFilenamelibGLESv2.dll4 vs NewLoaderCracks_1.32.exe
Source: NewLoaderCracks_1.32.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SurrogateRef.exe.0.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: csrss.exe.5.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.cs Cryptographic APIs: 'CreateDecryptor'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.cs Cryptographic APIs: 'CreateDecryptor'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hDc22q36rjYl7cot4V2.cs Cryptographic APIs: 'TransformBlock'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hDc22q36rjYl7cot4V2.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.cs Cryptographic APIs: 'CreateDecryptor'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.cs Cryptographic APIs: 'CreateDecryptor'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hDc22q36rjYl7cot4V2.cs Cryptographic APIs: 'TransformBlock'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hDc22q36rjYl7cot4V2.cs Cryptographic APIs: 'TransformFinalBlock'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, FcG67VRPX0ukIu8AsNZ.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, FcG67VRPX0ukIu8AsNZ.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, FcG67VRPX0ukIu8AsNZ.cs Security API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, FcG67VRPX0ukIu8AsNZ.cs Security API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: classification engine Classification label: mal100.troj.evad.winEXE@31/38@1/1
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00546EC9 GetLastError,FormatMessageW, 0_2_00546EC9
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_00559E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree, 0_2_00559E1C
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_03
Source: C:\comcontainer\SurrogateRef.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\fbe2aa62d1fcbb1d2019c06a99ddb3c6bcd8fcaa
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Users\user\AppData\Local\Temp\tmp9385A.tmp Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Command line argument: sfxname 0_2_0055D5D4
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Command line argument: sfxstime 0_2_0055D5D4
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Command line argument: STARTDLG 0_2_0055D5D4
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Command line argument: xjY 0_2_0055D5D4
Source: NewLoaderCracks_1.32.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: NewLoaderCracks_1.32.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe File read: C:\Windows\win.ini Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: NewLoaderCracks_1.32.exe ReversingLabs: Detection: 68%
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe File read: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe "C:\Users\user\Desktop\NewLoaderCracks_1.32.exe"
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe"
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\comcontainer\SurrogateRef.exe "C:\comcontainer\SurrogateRef.exe"
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
Source: unknown Process created: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
Source: unknown Process created: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\WmiPrvSE.exe'" /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /f
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" " Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\comcontainer\SurrogateRef.exe "C:\comcontainer\SurrogateRef.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: unknown unknown Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: <pi-ms-win-core-synch-l1-2-0.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: <pi-ms-win-core-fibers-l1-1-1.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: <pi-ms-win-core-synch-l1-2-0.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: <pi-ms-win-core-fibers-l1-1-1.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: <pi-ms-win-core-localization-l1-2-1.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: dxgidebug.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: riched20.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: usp10.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: windowscodecs.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: policymanager.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: msvcp110_win.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: pcacli.dll Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: version.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: sxs.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: vbscript.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: msisip.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: wshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: scrobj.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: scrrun.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: dlnashext.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: wpdshext.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: slc.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: version.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: wldp.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: profapi.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: amsi.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: userenv.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: rasman.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: propsys.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: edputil.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: netutils.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: slc.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: sppc.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: version.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: version.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\WindowsPowerShell\b85529a8a0a78e Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\Windows NT\Idle.exe Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Directory created: C:\Program Files\Windows NT\6ccacd8608530f Jump to behavior
Source: NewLoaderCracks_1.32.exe Static file information: File size 2064076 > 1048576
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: NewLoaderCracks_1.32.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: NewLoaderCracks_1.32.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NewLoaderCracks_1.32.exe
Source: NewLoaderCracks_1.32.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: NewLoaderCracks_1.32.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: NewLoaderCracks_1.32.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: NewLoaderCracks_1.32.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: NewLoaderCracks_1.32.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs .Net Code: p2NRiidmRM System.AppDomain.Load(byte[])
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs .Net Code: p2NRiidmRM System.Reflection.Assembly.Load(byte[])
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs .Net Code: p2NRiidmRM
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs .Net Code: p2NRiidmRM System.AppDomain.Load(byte[])
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs .Net Code: p2NRiidmRM System.Reflection.Assembly.Load(byte[])
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs .Net Code: p2NRiidmRM
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe File created: C:\comcontainer\__tmp_rar_sfx_access_check_6484593 Jump to behavior
Source: NewLoaderCracks_1.32.exe Static PE information: section name: .didat
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055E28C push eax; ret 0_2_0055E2AA
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055ED46 push ecx; ret 0_2_0055ED59
Source: C:\comcontainer\SurrogateRef.exe Code function: 5_2_00007FFD34669684 push ebp; retf 5_2_00007FFD34669685
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 14_2_00007FFD34659684 push ebp; retf 14_2_00007FFD34659685
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 14_2_00007FFD346500BD pushad ; iretd 14_2_00007FFD346500C1
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Code function: 17_2_00007FFD34679684 push ebp; retf 17_2_00007FFD34679685
Source: SurrogateRef.exe.0.dr Static PE information: section name: .text entropy: 7.238177576574828
Source: csrss.exe.5.dr Static PE information: section name: .text entropy: 7.238177576574828
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, v6luaK3qSQdG78Cyn9Y.cs High entropy of concatenated method names: 'UbyOwveBBZ', 'OeNOXiTnsX', 'xhDO0B6XP6', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'WbfOykEdX4'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, pC7UlOvJvi2hqAkL1D8.cs High entropy of concatenated method names: 'InaekceOgP', 'CXkeOXy8Iw', 'jUFej3DsLU', 'USjei6u0yo', 'RRieeQJHf2', 'W0OeoIfJdo', 'XSJeH3qTdG', 'GnYefWlxQt', 'J6qeF11k6K', 'jPyePgINBt'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, rmnQxrKweXovxmYFfo7.cs High entropy of concatenated method names: 'cchNUIkh25', 'zUPNmOjQPP', 'qIJtIOPRG1ZjvXiH1qI', 'mG3Hf1P3cSRYYytdcXP', 'k5OrShPXjSrcIKPLShu', 'Yf1mLSPtaFUUp5bvmp0', 'y3nrD0Pk8RCVZA9NTqE', 'kdLJ9PPfxy75un1r0M0', 'bwoIcUPzudKKsLwKOBl', 'eIwaquLxYE5QaMI2sZn'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, N43Em13sOK0bOJdFKYn.cs High entropy of concatenated method names: 'PJ1', 'jo3', 'uLbSwvYDkJ', 'F7kSXo5Oq0', 'Ye4S0ejdP2', 'EC9', '_74a', '_8pl', '_27D', '_524'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, EEuZ9r38tkfgiKsc6S5.cs High entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'FAyOkJskxn', 'PUYOd208e9', 'rfxOOXcpmM', 'f6rOaDuBaH', 'lktOqeFjmU', 'uv3OSMaq1f', 'n36wJviLJSCZkVIRe71'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bpHPos9OBbZYq4VcBpa.cs High entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'oR90DvYf751JLVGVH2I', 'OpbxXnYz9Q16Rs8bpTf', 'GposnRexhWIGTr9BHTW', 'U95QuMerdImuIqIV1Ak', 'mLjsyiegIr0cj1ECjZw', 'pX2qL1eNbP6LFUMrb8Z'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, miph6a4RmaFZ1Nl1NL.cs High entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'efuPsWWpJqBijSMTupx', 'iZNWhZWyYcpBcPkS59V', 'jumLsRWYBuDggxwt2jp', 'kXZdb1Weu9xqVlesb44', 'z8ljwlWlCXFredEF7ml', 'DNq2YFWAlFUf4Mm9y6l'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, t4CLPVs2O746c94BsC.cs High entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'NpbC3ZU0p5NkaIktSx5', 'oTGmtLUdZ91AeqAVlIC', 'W5VvsXUGIVLFI0QAfVn', 'n7creJUJsBerPLqj2JI', 'IkKqaaU83biX38lY8iC', 'yJ0Yc2UwhDNBvrSuwOY'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, YKi3fZ9hlb310txy1Nx.cs High entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'TDN17SYQ4qWF0NvupFs', 'AhdeobYPubtuci9IuGJ', 'BGsbkxYLGUE2lyfxMol', 'CxXm5jYabGXEy1jwc6l', 'frWUSTYBtUkRC0Te2vS', 'Wkv6FnYodj5P7DdQrcB'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, SSylUP9EuEheEVLMLoR.cs High entropy of concatenated method names: 'tSK9W692gs', 'aAOlp0lLcNB4TYQckAS', 'KtNQojlaTUIk9ytOT40', 'zG1s5RlQrBNr9yOoHQm', 'W8eiMXlPAo06WJCnY4R', 'jrTPDMlBULIWwgBQM7N', '_3Xh', 'YZ8', '_123', 'G9C'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, ngF7YCRzpDtcgD33ll9.cs High entropy of concatenated method names: 'hqeXaX3rRb', 'lyrXqmtEXt', 'jBeXSG2g9X', 'GeWAIM191yrIR7LIPxu', 'htlZbX1i2ajK3BLNi1l', 'wxEibH1B3iYH9Uelhmk', 'TUfEhl1oGUqBxp1VsPW', 'iQPpZe1TxySbViodSA4', 'pUVMJq1HwGDIcthXSxi', 'APR4wf1srd4wmi2wnhg'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Ff88SRvmh15s8qMeoS9.cs High entropy of concatenated method names: 'zatrunhjW2', 'XhXrxPBiK9', 'Fj0rD95WWa', 'KJtrBkcv0s', 'BowrEfsyQE', 'C4K08fSQnd6EpLS9WPX', 'MVBux7SPGPAUCTasrn6', 'iLfGAgS4lv8RXgFXBR7', 'aNJ5xhSnm0PcMTJ1lFs', 'Nh4ZUYSLwl1Ks8DstFr'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, wfmoFF7hiRD3cgB0IB.cs High entropy of concatenated method names: 'toFjFhiRD', 'aNIQtr4UNoIW4YXPDY', 'dJWV3x63FI3nIGZZY6', 'NaH0WLba30QKdVZ1K8', 'vaxaYHn6caHt4oyBWn', 'jjc89tQ8NyExDy1DXx', 'VCYlBLvOI', 'uCERqN71G', 'IGqv92bCq', 'jp1KNowJ6'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, n0t0pSlTO21awwWGEMh.cs High entropy of concatenated method names: 'piTvm04MpM', 'FVxvpl6Feh', 'O29vTElPEn', 'dgVvh7XuGZ', 'qiNvNXq2k1', 'dnAmgQZxmkjM05ZNAW4', 'wnVRWPZrnXZAOjFWu9x', 'OLFvLKcfL3OTtLUUSGn', 'UqlkV4czxp6kEFWui1B', 'xFhyK0ZgCReDkXMUVFa'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, s4k6M29947Pd4eU9gQX.cs High entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'O1mXrNpGeywXXCHv5hG', 'PdVPW5pJGYXZLTfdVAp', 'RYcxgup8yu8t3msQRiK', 'KFXH3hpw1dbKdeyxG1E', 'KYbpQtp5QekFTQAKu5A', 'UbNhxlpKckVmBNhbjqa'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, aUhb82JNGmSK692gsl.cs High entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'Cx5ROSWHMYC5VC6oCnP', 'Urrjs7WsPAjJyc60TOZ', 'Mhw0axWq0ZDKGFoGHs5', 't5JtcCWDv1rLQkormq9', 'BSOvW9WVP4ayInFXWuG', 'VLiPeXWIfgnJnw8Tvgq'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, RNPKDLRgnTWovsb2PfJ.cs High entropy of concatenated method names: '_269', '_5E7', 'PQXAY7VWLI', 'Mz8', 'yohA7TleOU', 'OP1F14KMF4kj7I4bm5Q', 'KTt6cgKO3RuPk7vQ8aU', 'kEl3iAKR9ON6jrrD1KN', 'ha1GFeK3RyCXTPAArw5', 'muffLoKXqwKU5kwGwGF'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.cs High entropy of concatenated method names: 'l25liIsSVRAXkTxhLoT', 'kRCHdrsCZmYs8K5oHpY', 'cTTwX2s1iN28bgeyNcP', 'LGr1r5svF1wdi82OCj1', 'Fcl8iXx74V', 'sOHDvOsuClk44daZQ4g', 'ITwhOPs6YmOKYDicVB8', 'uG4K4qsb0xa1LiMrm47', 'aKhPols46I51NIIFjjh', 'DkSo2msnJdwGX0u8XoL'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zBhiTPvKhTWbp26i2p0.cs High entropy of concatenated method names: 'pY8yHFUs5G', 'aUCCrsvdwjoMe4LBmZZ', 'SjOoHVvGoD9gA7bhYmr', 'rhXaAxv7HkjLAKVVa4a', 'bejCuev0EgmIHetNxmF', 'BARX5oQXfK', 's9xX8C9TXM', 'v7vX1ol8mo', 'OYiXu0FVCX', 'R4XXxYYjao'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, LqC3sHlqHwtkwo6WEcx.cs High entropy of concatenated method names: 'mnqvWGuQpD', 'I3gvYhqYsf', 'MGRvznbE1i', 'ITiK6o6LT3', 'dyWK9K3kSS', 'ybHKltf92S', 'IbtKRNuRTP', 'GNbKvWoAlK', 'u9PKKHe0t0', 'x9mZ5fZ3x5ZJG68aGVV'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, x53ABG9f1owHDDKBaS3.cs High entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'qV714oYxEu5IA2a3IyF', 'tdCyEVYrg90xmuk4ey3', 'bwC1yfYg8T5ahHZGFaF', 'LrLyhWYNYKnYVp4WCZv', 'kCOJKvYUdWmWYgv5nkd', 'qNKUBqYWEbuDaorAp4Y'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, vVOmPGvrq31DO4wGvpR.cs High entropy of concatenated method names: 'R5nyDoZ5tK', 'DwTyBrHcuW', 'kk9yEV8q9Z', 'b9gyIJCf9Z', 'EeuyctOC8U', 'jRTHRsvfDsnDW4YldbC', 'LXbZTHvzS3aRgR9ypIf', 'tQHYTlvtoJJ6V43XY8w', 'nhcgyQvk9bof5Qmiq6d', 'ixvoDiSxBCp6UFJKX25'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bIFPV1lcgwYDSDD5lM3.cs High entropy of concatenated method names: 'bUo3Z5cfiR', 'gCx3wimkVY', 'qfuKiS03euwGOCRsh0W', 'BMIA9Q0Xq5UEHcenUUI', 'dtHJU20OQiAFIO5ANvA', 'E5ecsj0RPxCCbXlN4Se', 'oVv3Hi9Lyx', 'vrioWWdxPAAeEAOZh5e', 'OkLqyudr2pemMUuLDdk', 'SmEmKA0fUF0UgZYyBEc'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, JeBQwbdky5DS6jtXTP.cs High entropy of concatenated method names: 'WHsxJy1sc', 'u2WDYPxEk', 'aHmBs3h3r', 'ege99wran3LKLhyMRgP', 'i9kMHprPcg7MLdfjQrS', 'uFaJDVrLJbcmY4mMoMt', 'c2rpZnrBoiUKMnDlhee', 'gIBPDWro1FcnGOkEtvy', 'yebZsKr9hnYS0xnOuhX', 'mhmQE5riEYTBa61AsV3'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, qdhFZ8R4DvSTxeWyhpd.cs High entropy of concatenated method names: '_9YY', '_57I', 'w51', 'i55A28VT4E', '_168', 'wh4ZssKvk0oUHRnpIPh', 'pWB19ZKSXxIDgPLmwpM', 'Fqn38NKCyuOckWts74a', 'zoMDN2K2u7HS2s9nuZw', 'brUvuJKEEsPq7wABrSx'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hDc22q36rjYl7cot4V2.cs High entropy of concatenated method names: 'Gh5kLPB2Ov', 'kFnkVYtcxi', 'Gdrkno7VIK', 'TH8k4bfWZ6', 'lXtk2XA0DL', 'es4ktcEykF', '_838', 'vVb', 'g24', '_9oL'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, gWl6xsRsO4F1ET3XU7j.cs High entropy of concatenated method names: '_5u9', 'hLLAwVhSAi', 'KM6X61hMyw', 'WrwAtwsyJM', 'mCKeOY5tXQeMwS6MiHG', 'v9FKKJ5kQ9RTBpF7hye', 'GCBKyX5f1waRepCJ85T', 'TrVFHr53drf9y9BDftT', 'Ba8k165XPXWXtEIPSsh', 'KB1lyd5zhIZrA5XYv5A'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Kt2Y7f9q06pPifGXJIv.cs High entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'OF6sUBePE6BtaE3Kuth', 'jo2OSGeLZQCihT7DSeP', 'bTYDhYeayv0ue773mIo', 'tISHVAeBJK3JyVTc0WR', 'XUbls3eoaS4tr8O1Zld', 'fKvWaue9899EEIL168C'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, OoKQBd9PQOIINrUiJIJ.cs High entropy of concatenated method names: 'nvH9SECnn5', 'EJtkr9Y02dd1A38WfQl', 'XlHpHOYdWQf7eQiK3TE', 'WVUDHHYZBVdAyebjYG9', 'lG30BEY7V9IcpZdKkVL', 'jf43DHYG4UQNuA9wAeg', 'wDNYDYYJJOjAGWOYYHM', 'OoP7uAY89U3psKsYPh1', 'C0ckiUYwef8IS4J0kWI', 'f28'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, tUR51qRtos8neeSCfCF.cs High entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'KRAX0V5agb', 'pBIAOwpU4N', 'BVnXyNYHGn', 'QSmAdTpoPh', 'tIS4B5KaehkqaEXNWVO', 'Ek9kscKBa9VD0kLhBRt', 'KTxkDuKPNsRwAANJxf6'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, s6gHsPvOqP2JDMQnOmc.cs High entropy of concatenated method names: 'J5yjuhKgDq', 'iILjxvlJMS', 'iv5jDGxkJ1', 'aPtjBEwN4V', 'YP0jEhUOYu', 'R0kfhECGxgpsocX10dM', 'NkwZHtC0HtaO4Q1lUQq', 'EQQQPRCd2INaDLUgP93', 'WbfQd2CJ2MQlmW0EuGx', 'RP9RK3C8hWX6nOLiBP8'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, VsKPJfRrqU3kOWT58HW.cs High entropy of concatenated method names: '_223', 'DyYk3t8078Xls8GcoPP', 'FfYd4F8d8HoBmL5CqR5', 'Kskasr8GaKO41fREd9M', 'HuoGNd8Jm5tuSa6awmA', 'oUExc688tSyeHKK1Utc', 'YoDYYH8wL1wwGyrAPgO', 'INVPkY855VEwi5Hk9wo', 'c79KOZ8KeBDh3NkbVJQ', 'IT8FCp81k70nebsS7fw'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, qaeqiIKANYedU44nENd.cs High entropy of concatenated method names: 'vT1kvNUqqj', 'OmTkKTboCX', 'YXEk3hbTqu', 'MPDk7suR6d', 'a3qkZk6930', 'ztpkwYWJKy', 'rhnkXmkoqO', 'QG2k0fm6gG', 'ScrkyvZfkt', 'CBhkrbdtO3'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, q91kAv9rFvHpicluOel.cs High entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'HaH8HHyCXGop8YKgc1a', 'APchiSy2kqWw91PSEOi', 'GZ05PByE3sk4o0EOdv8', 'NhawT9yuGjHFVrCrgEk', 'Ir1woFy69AlQfLYVGYL', 'lRfe8mybEU5OwPbnAHD'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, wyJFCl9x9fYR1NwiG31.cs High entropy of concatenated method names: 'F7E9gcvwr6', 'MUfj3Ul1pG5vZJ2Ev1w', 'GnXQUwlvbLFmx0ghYdg', 'l6S47Vl5JIEZ3oVoNB8', 'Cplf9RlKcedFKl2UfKh', 'fk8aCIlShZqeJ5obuJr', 'QLw', 'YZ8', 'cC5', 'G9C'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, aTrJGWKb56QoYmFQAQO.cs High entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'HVakhyUyrY', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PL0IiPRfXfjK4KIr5xd.cs High entropy of concatenated method names: 'hfOZQykpe7', 'X0kZgyn0Ye', 'iGXZAe2Oy0', 'wFBZJ8TVOm', 'sGqZb31DO4', 'b3r8bpwpvlVFM1YtCxV', 'DZdmsgwyN68LpPpt5vZ', 'KEa5NUwUNkJeX94d9c3', 'AfN6ljwWAOI47SHnqPd', 'ohtw2dwYARJiUSnoAPL'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, lagxIU9pd3fOSXyoW5x.cs High entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'WZDHd9Y1dC2erxni2rA', 'hxgcadYvd3d5hqN9UXf', 'Q4QydsYSxFHP3O3Wte5', 'c6dh0SYCXf6Hj4mBnUD', 'g2SP66Y2dZMnKI0HJ5d', 'dR8NnQYEDpgQdD9cSd0'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, eKIJSugVWHhu7Ecvwr.cs High entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'kdmkiPW2ydU7yLhH4bJ', 't8cnxjWEqHYHYgAbFFs', 'SuDoaaWu6dHFxi8iIh5', 'j04Vc4W6fIkK16YI1Jm', 'jsGejMWb7P6bSG2oGb6', 'tEM3HUW4VHpP5GfiQfF'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, BMDE7K9JJ0GausKexUM.cs High entropy of concatenated method names: 'm3ElPMHjU1', 'n1sALDjpaBN183WFupS', 'msuOljjyc15pgkWhgdV', 'hn9NDOjUGxeQLaLWemX', 'gobQsUjWpG8wIqBRDPi', 'EqH8mNjYhm0J7Yt6iI5', '_5q7', 'YZ8', '_6kf', 'G9C'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, L3rkJ9v0wfOykpe7b0k.cs High entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, onxbvKvFYRiYgj2LUgx.cs High entropy of concatenated method names: '_7zt', 'UktrPhONEb', 'MrdrUBwe0g', 'bNNrmQgrLZ', 'rfNrpqF7q3', 'GoOrTfCYtW', 'NU2rhqvBE0', 'MtlJMDS5MlaZqhjEEhq', 'N5FKvoSKTM3xHTIlXhk', 'lihOZBS8JBwj3DG9768'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PhlmOO33kFK31SVC9ER.cs High entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, LRnbE1lUiETio6LT3vy.cs High entropy of concatenated method names: 'r1GvjPTNAP', 'hnJviL8UrN', 'm4iRFbc15rKk2HUhw5i', 'hnjdTbcv7fuxLpQMFBO', 'wamRGlc5ZOO0IGlEamL', 'kfk3IOcKQ6W9MRJxu3R', 'GSroIYcSvPKtg8OUFeU', 'jGeINRcCD4RcfnTSr5V', 'eBeJJbc2jvE8PTQU09v', 'MyKTBTcEZ90VNFlfU40'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, e2xI1uli2BvyPgOWt3H.cs High entropy of concatenated method names: 'cDIRJmiyo6', 'MG4UoJhNwPrQjI5lB57', 'U2Vo2shU57Ndo89Jev3', 'frcPyphrOu2UfXMBuXm', 'dT58OPhgNISD3n7GAjH', 'xuoR9XhWo6u6GQDCoUm', 'H4vWC1hpXC3YTFD5tuo', 'WH7iLmhy778ggBsjR1A', 'FqTw9KhYemN6TlbZSkk', 'HLasCjhe7UmZ9itjD9U'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TNvZay3pOuluj5OwSvS.cs High entropy of concatenated method names: 'J8NdUIO02T', 'QcidmRVOZn', 'TCOdpQ8OEV', 'wu9dTiTVve', 'BN7dhM0eZO', 'wTaBTbot6PnWCXSyrrD', 'tQN52wok6TMm4r0Z5nq', 'ymlroHofNXOrObjWJqI', 'JHshW3ozoYlE5aZ0FUo', 'FmaqX39x4QmS2KWLYIh'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, xuDPF3KRHi7u5qFcYsd.cs High entropy of concatenated method names: 'gOnlHA45JGQn4hPG3PU', 'lTDSat4KTMTCK0ha96P', 'sPU3l048oIvTtYbZNRv', 'esFxZO4wGtMvtUCteGB', 'I5oUN2uKC1', 'qsn9xQ4SAZCIj64X34R', 'PxoJPX4CeqbsOx2PAxd', 'xcLbJ341Aom3Ll00t5N', 'jYjPFa4vYwJ8I9fp2wm', 'EC9c1m42l3QZHL0UCtl'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, DLIptRcP5hqxvlRK7M.cs High entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'hEYIPXNXkXHK9CCajp1', 'Iluc2ANte7GTmMvoaS3', 'iUJmk6Nk5pHZiJLxWcF', 'ftCh5jNfmD04tmTZaeh', 'n5g0q5Nz7eb7pds2mTj', 'ca0AxWUxlNYxXD9JXmj'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, phqcKeK1mcShOwIBfct.cs High entropy of concatenated method names: 'nPdNQPeJDG', 'gUFNgbmaM7', 'oZqNAYtgN2', 'ywTNJHviQY', 'XXUNblJrN5', 'TKdNWheNh0', 'S70KeMLDLo1IHDhkKgI', 'huLhQDLsbXXVWhJ4CjR', 's7yMwnLqE57KuAPVsm4', 'KJUnoELVq59x1PWsslM'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, XYTvEgEdOn3VF2FFNt.cs High entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'kalFvjNPmM8SteyC0Q9', 'rvao1wNLof2njj7JelL', 'mVmDZlNaGWoPwvEiXQE', 'asaKdlNBWi4AjQ6uKr8', 'iSnoU8NoN3ZLogTK3Wj', 'W4Hr35N9QS18Oiy5eVo'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, USfWgM9YPEPl6et9gXe.cs High entropy of concatenated method names: 'AWGlTgtLEM', 'NfllhXZUOj', 'KVJlNJ1knj', 'gayaNPjAZ8lrH9wkeeH', 'Odud3ujeWQXsklyTimV', 'bxTdfgjlOgR8fBE3ZNo', 'LtMVQTjja0vtixpRajV', 'tSiQuljmXFiFuN71BKn', 'KZdd0NjF50xPW0CoVs5', 'rAk39wjhWhK4qBykGYh'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Q6dtO9KQg7t1MhAiPxK.cs High entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, jinINCvwU1Z6HGWbpLQ.cs High entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, EjwkB2z5TSBmyCSo1h.cs High entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'q5iZGMpNVPubTJmdLn3', 'zJcIOTpU1iONtROt9oe', 'Ql6soUpWpkJJjYuYN7l', 'zdah2WppshZuw3Obsp5', 'Wb9iWtpyttnjJxVjFMM', 'iscfADpYGHYMQYZXcof'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, gPM5LvW7t53NGescAL.cs High entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'MY91KRWRHimB6F9SG6k', 'Jyq2QqW3JQpENsFN6wi', 'KHPDrGWXOwSyJu594YP', 'N5T8AdWtM2q9iBBxjES', 'aGis7LWkSi7agLi6BCy', 'C5uVPVWfgQkBaxTf8qX'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, OVytoBRJkkB8mvXG3th.cs High entropy of concatenated method names: 'TlPHTQ1Lr1GVEauAnGd', 'aHX1jg1am4BwchPEu7b', 'YovKSi1QEsJeLj8Ljxr', 'N9dTp71Pet8d84ifGPn', 'IWF', 'j72', 'q2JXHOEhHZ', 'WYlXfOxxmY', 'j4z', 'gFcXFagpHr'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, sTNAPZl6nJL8UrN5G3c.cs High entropy of concatenated method names: 'fm0lkCaThQ', 'XbEldbTxdU', 'c4hlOBadqX', 'kM7nkHj4DN1WeYc4yfO', 'QpOGsWjn5owk6jbJGWi', 'YsnsEQjQAYZbdR0mmM6', 'BQEiSYjPag90a8PUBlL', 'w1mDG6jLFi9XTIrELes', 'fcReEUjaPC1L6LKOkOA', 'hJ928ej6wXw3jv05kvR'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, eAIEiWRGuT0DLdJmEdh.cs High entropy of concatenated method names: 'sg9', 'EkIAVk66FT', 'Nu3wWtnBd9', 'WKhABR6MFT', 'AkIqS15Dw8YD35ppHPm', 'kOBkey5Vt2bXkyT6nK7', 'sVcO5M5IQAhDYS8Dibf', 'cjPp1H5sG6ylnlvPrfP', 'KMJv0k5qV4cmAGElitI', 'ahdtKU5MJIGOusEr0ZR'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, rq0uC4T7MAii88bDUZ.cs High entropy of concatenated method names: 'RG0N0ZYOs', 'eK6kWD0Ph', 'uo4d8pegH', 'KOoORVZT4', 'NBYa1HoDK', 'ryjqNo45j', 'qL8SjbWuD', 'H7KAv3rYYMbV6L9iyQH', 'iYeqm4reuAdY7LpBo9X', 'f7kFXxrl472QpMLGNrU'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, BHA5ckKxN1RpEYO0A8A.cs High entropy of concatenated method names: 'wjrk6CPXEY', 'PVkuHcLtlAPVveO1LMe', 'tuM6WRL3GG7vIT1o0Dg', 'u4tpUrLXTQDx7wUqCWV', 'Dp68nULklx7Lf7Po4cN', 'Xvc7EiLfeKGfPywgvM4', 'TRhsE3LzaOXyPmelpdZ'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, mrhM939KRaqZJpAEAQQ.cs High entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'AYu44dpsNdAyGhObePU', 'UgWrWUpqvhv6l9ayvbv', 'yP7ImipDbPWLjJT19xb', 'bCGo3RpV0BfNA9jo4y0', 'krc2krpIX0YiB1eoL6u', 'bA8sSspM9Rp5w0omMW3'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, LaD94W3lE6s9EXDgZOf.cs High entropy of concatenated method names: 'a7ydZGrQIx', 'khOdw6HShW', '_8r1', 'UDpdXw4kTa', 'I07d0ldRwA', 'UZWdyfJgpO', 'xsrdr86OEn', 'WnwrdGoZyPxrLQBJlt8', 'opKCORo7PlCfXwAIUhv', 'RHMpeLo0EV7rW0ZL2re'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Qhvj1tRVCck9P2urqru.cs High entropy of concatenated method names: 'oYo', '_1Z5', 'EgOASKP5h3', 'vtcXvLkGQP', 'xCZAIl0I8E', 'DJGvfgKFHwvyQTc8CEx', 'X8yp41Khjq5oul55aXs', 'dWD2pOKcpYHREry4Z0N', 'Msu0s4KZWQ0XopUxgae', 'MUIk9DK7kMp15rtTNCY'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, X1ksjx9knfQstQDiYaY.cs High entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'AOQGf9YqA1UIT7lv1Xt', 'hj6w9AYDr1U192NRB1N', 'HuFlk0YVji1x7cmj54w', 'yYa4GgYIhTVF35rQ6RF', 'xCTNSwYMusFg2cb8627', 'Nc0lcqYObTko5cJGct6'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, x9V8q9KYZ99gJCf9Z1e.cs High entropy of concatenated method names: 'Px9kaBludq', 'U81kqfOCt7', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'DjVkSnXNMf', '_5f9', 'A6Y'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, AeHf0H3200N8F0h8wpX.cs High entropy of concatenated method names: 'y5lSTMUUv5', '_1kO', '_9v4', '_294', 'Gb3ShMLE4g', 'euj', 'XeRSNmdR9p', 'uToSkeHpkY', 'o87', 'reYSdBXeEv'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, x2GEZo70QclrbHZJC0W.cs High entropy of concatenated method names: 'EY3YE2uu2c9iW', 'Po7KbWscbaHFsF6WQCs', 'fdCM4BsZPi9NNyIDfAp', 'iHMsMSs73oSHe03k5Bt', 'mdEEvts0sPu0fQkUUQv', 'r5ftS7sdocAtDbJF6Rt', 'EhXd9GsFKeNhLCBulmd', 'qd9BhGshX932ec2aFUL', 'oQfl4AsGaIeUVhR9njN', 'tamlDisJeCAEsF9ERBH'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hAOp8OR9owXPgPYp5DS.cs High entropy of concatenated method names: 'lUE7SjZE8X', 'qTj75jd32Y', 'i5F78ixgXF', 'xt771YwYTs', 'UYLco7dzUUt10rOtJWt', 'uvSlWldkWXSW6ddtJVH', 'C86E2mdfjh0BUNm7lHC', 'HSEAShGxWqsinJE1HAs', 'jSl4sKGr6yVX4hAKJ7V', 'Wk1IIGGgKdjL5e4wHdV'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, N36yYH3OXgUyXNSpeM6.cs High entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, O2gvDU95NOMAlPJ66JS.cs High entropy of concatenated method names: 'vKg9LxagiM', 'zUMPhflgnjnBjSHYVaG', 'WnScjSlNcyVCjJSSxni', 'PfUKWJlx8WM0Lr1glE0', 'X5V6hrlriNlDDw3d4vj', 'p54QFxlUEhacfWlvNHs', 'bB1NX2lWY8iWnrcxoEt', 'wVAtyRlpD2AAmr42H7C', 'hkA9n7vOoh', 'YVMt2aleGiwN7YA3vRe'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, RHrgSUlFJHPGi4SFpy2.cs High entropy of concatenated method names: 'M7yRzIqi4n', 'wU2v6E0Zrv', 'peMv9GgbRF', 'ILsvl7Rb6f', 'nOrvRdAgSM', 'HE7vvKJ0Ga', 'FsKvKexUMJ', 'eQxv3jPKUX', 'ituv7DIGxW', 'p7OvZrfWlC'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, u1OIBIRiW3RmDFyC1is.cs High entropy of concatenated method names: 'YyrZMZ6Vis', 'vsTZs4QOqX', 'Ss2ZLg45rh', 'jinZVINCU1', 'N9KmDv8nsUvdVr27GcP', 'DbFkgD8QUhye42LAKoZ', 'SZ7Lcp8P0Id4ItLNfK3', 'TLIunf8bwoI8dn9Dhaq', 'k4S4EA84YvOoMri0tjP', 'ARFvRa8L6eELV8sva7x'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, nX3rRbvWryrmtEXt0Be.cs High entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, c4hBad90qXnMVQO8Ubp.cs High entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'YSwxdTyG4talWObDOMc', 'OZ0AbSyJOthlJDMHL8h', 'lgBl24y85f9IRRhj7UJ', 'oREoaMywsQ16MClkGYU', 'HjTY8gy5CaI01lUudDl', 'Ru5LoeyKBNQ17VjRoYw'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, h3LYx29iJMw2kCMi1e4.cs High entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'JU9wG2yBSVJ1uCm3oGp', 'XL0qkGyoMDMUucEcHj7', 'fq2CCSy9AFLYhrGPhuC', 'rUgRWryibVLDKtGloyN', 'KWRStsyTpgH0DyLd1lI', 'JfackfyHb68M9fLq7TJ'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, SRe90Hv2cbPqfyBf2JO.cs High entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'gJCie0Wewf', 'k89ioxf6vw', 'r8j', 'LS1', '_55S'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, tIHideRpbh7sVl4tMfy.cs High entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'zSNvRD5Fk2mNERMqahM', 'mCpyvT5hu8wXbF2I8f7', 'x4l0155cfYyw2TUNWFN', 'A0vint5ZXerNOvmvTuC'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, H9kGRDulG42C0P2ENw.cs High entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'rGSM1Y9mD', 'lVP5VhgQUgrn0WFqRbs', 'TSkwCFgPVKbh3jrhmJP', 'tn7IKKgLd3qHLjiBgJP', 'SwGposga2DRfwjDGmb2', 'Y73KRXgBf7tq9IUwnBk'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Dy5bm1lHtULYyswFZHT.cs High entropy of concatenated method names: 'pMTRWUrh5F', 'NcvRYFLZ3n', 'XITaTyhGaykpKsI2YmS', 'sHW7WShJJJdH65DQYS8', 'aJx2NOh8WjSaD9GcXZk', 'mJN0MqhwyS7QvtxsLnc', 'nvZchmh5JPBBart817K', 'mRvSN8hKgP1jhYGlTgN', 'PwiLgIh1vCw5Yto0mrm', 'EBoOp2hvmg36y5dhITU'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, ebQm693BTWgIeWA8YnZ.cs High entropy of concatenated method names: 'ADqqEBvAq1', 'L4XnogTuweZIemqPxJb', 'iC71wIT6KG0h9ZuGm4I', 'N6VceLT2a5AFO46IllV', 'WH1CYvTE93dICgqcIi6', '_1fi', 'TFDatqh3p2', '_676', 'IG9', 'mdP'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, sJuhRilllHaHsYLl3yG.cs High entropy of concatenated method names: 'NjulnYeklG', 'ChLl4oKQBd', 'TOIl2INrUi', 'WIJltp3QJd', 'CL0lQdRiSf', 'xT1lgakJAu', 'mjT7Hlm0083o6xnXqZi', 'khE9G1md4Z82kS47Doy', 'yyrxALmZYQbFgB9q2bj', 'qInGbHm7rj50b3gDb7T'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Kk2UoY9R3o2OILLuSZa.cs High entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'qcv7RwpuIYEaQWfahxf', 'rmXJNDp6g61cqgoHZce', 'Q0c5kXpbWL6EchsLyl2', 'EOcyiNp4suKotc7m1mH', 'PDqymgpn1SkmF8r2f0A', 'rZ5oXqpQ96slwwMmfeK'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, m5kvJIRvqQ6vk88BQ7d.cs High entropy of concatenated method names: 'erA7GowVsi', 'ctD7M19yAS', 'u3P7sJvRTj', 'fZU7LEpvoE', 'ooL7V02ywn', 'd2n7nfIWX0', 'iHgi1EGEp2NooHvRoxX', 'QuAGnqGCQ4FEtAtfPTP', 'N6pgo4G2kBaABTBj0vZ', 'oDODUKGuZKpEqqrHynX'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, KQdiKeKO1yr7g8kh4UY.cs High entropy of concatenated method names: 'ckJNI592mZ', 'K7INcB1Ylf', 'QYgNC3Gahk', 'OyTNGvFOKa', 'lFJNM1bPk3', 'bHXHafL2Vbgv2bETvyT', 'dvlndsLSxsfPlBC4gSy', 'VR5PAcLCoiv4RvJfUek', 'hA98pMLER4vPHmltxil', 'quN8TkLu0cTSH8UGt7Y'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PgZXc9RXyTK9oTr0lMn.cs High entropy of concatenated method names: 'IjKZu2xpR8', 'HeNZxC6oi4', 'SHlZDqaUq0', 'mWa5cB8hDZkuDqR4rw0', 'e9doOg8mP8rGJgWL0Nn', 'huTXJX8FJkee9QyyjH6', 'Jo0uK88c7DnHloLVYxB', 'XovZesb2Pf', 'WTPZorSu4x', 'PJWZHSKqUZ'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, uiKX91lEy27eHmxVmOh.cs High entropy of concatenated method names: '_0023Nn', 'Dispose', 'F8qKxEyjGC', 'yIoKDypiKX', 'b1yKB27eHm', 'GVmKEOh5aJ', 'c9DKInNSmN', 'Lt8RRT0eU6Kb4mMTIQW', 'cYYG0u0lv8SwcDWu3qG', 'rYqg5x0yufeFQkAFjXP'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, pjU1xV972YyawOghLYj.cs High entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'CrvR36p351q4rtc9MEp', 'PlWrB9pXJY40832LlfR', 'aLI4fkptjIRnKBHdOW4', 'qQxLtrpkMWpUvNfk8Xo', 'Oj3i76pfUwwXTGkCkDY', 'HeJo6rpz1cX1OoA1IhJ'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Bi4nhU9g2E0ZrvHeMGg.cs High entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'SmngsnAVw28tbT0ejQw', 'll3XFPAIeQNFJuAKqOk', 'biVlcIAMOhGqQxvK66w', 'yIx13mAOBbmQALeiHW2', 'JYb2f8AR1YKhggYtV1k', 'dq8n9WA3QIc7b08YwjG'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, mK9uj03h95WWacJtkcv.cs High entropy of concatenated method names: 'IGD', 'CV5', 'DEQdNohDJ3', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, t0ASy73kLI0VDtXhKyu.cs High entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, JMMflX9wZUOjcVJJ1kn.cs High entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'Ek5Gt2yyrg0NGvBE7oK', 'SAlkisyYhhPtxSgrMSi', 'QV1jO9ye92e75cK1L3g', 'wvtKcrylnbeM42HDXVn', 'GvKjBYyAVca17aehr8C', 'n38Sh0yjscYZ1P75nle'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, e9gKEc8j4ccPPjIvJc.cs High entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'Fyncsbus5', 'g2RtcPgGN71n0R0HLkr', 'QNiqeWgJjK1ZuFphij5', 'eUXmpkg8VbUruG6xdfm', 'Hklig6gwFaXNmCU2ldE', 'Kqr2RIg5YkmgMGbJQ2D'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bPQI7ERoRB9E7CghuZ0.cs High entropy of concatenated method names: 'TdaZ4hmt0n', 'i02Z2eaXc2', 'UeCZt3rkJ9', 'gMeFmJ8sS7DtHB15WYu', 'to4wbs8qFB8dc5yhvk6', 'LhWKt78D8gob7wjC5Ie', 'HMU1jL8VelvfSMtfOic', 'Jq3ZA78IZwDyxBOTuET', 'u9fi4i8Md9AChomx14B', 'bwsS8A8OtKOaxhxVVa8'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, WnhZCTvNt7pAc8upimk.cs High entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'SRPj6F5BCh', '_3il', 'ceNj9W0KYc', 'B9kjloN1c6', '_78N', 'z3K'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, FcG67VRPX0ukIu8AsNZ.cs High entropy of concatenated method names: 'Mm6wenY5uf', 'D8SwoRh15s', 'DqMwHeoS9u', 'fsJPB6wTM6IZvxSAyES', 'GTOLThw9H22ZOB4HrHl', 'F1Vkq1wiBpLfH8wAMJN', 'P6ASDLwHlpsXxCrteYs', 'S6ow3ESDvf', 'csyw71PREi', 'lnawZWR8E3'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Bx3xFGavu7JDAx3ga8.cs High entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'mPD1ZIgA9ytnne4gIxx', 'JlxTn8gjapJMj0uMrc7', 'TaSRYIgmQQVkJbAgJ3s', 'fw2MuwgF3dr1Dd0yf0k', 'Sq4Y96gheYYax2aZ4Xy', 'EiZAsOgcdfikQb6leKm'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs High entropy of concatenated method names: 'coWR1G1FuX', 'ml8Rugb4vK', 'D2WRxBK01F', 'gnURDcsTZE', 'jb9RBfxnXR', 'EtLRER4SPW', 'pxmRIQfxDH', 'Quw3QkF1D6ZG04dhJnC', 'MYd39pF5yOqpZpuGxvK', 'SWqtxeFKFxbWlrZ1FNv'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, jVvmDbVGlxm7LTy0MJ.cs High entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'ncuKyEUTappSDQKiNuG', 'XDpDlWUHFYK18FKZtEa', 'RDii66UsJwVn81M8oZZ', 'f0GZEIUqrYVxpGbG47x', 'eYR3h0UDVbB5DcmjexV', 'aUtIldUVBJVHjHvM1on'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, ncbOUZvgUIhYx2a4pMk.cs High entropy of concatenated method names: 'HJdiWLpD7s', 'OkfixJiUKQ', 'sWqiDjD03I', 'LskiBB5u2X', 'u0ciEgA9Hi', 'NNgiI3pMAI', 'mAcicvajAL', 'RLuiCyEitq', 'wb5iGJk6Dl', 'a2liMMJGWd'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, f4UGf9RNywmjIhFCXBq.cs High entropy of concatenated method names: 'Ox4w1ZnmNd', 'D2Cwu6vTpk', 'yVxZrq5dXJ2SILFQ9tM', 'cRE7KB5GPEeIcVL5css', 'Kf2w8M57BBUgA1hPKxo', 'ReYxjA50MqlTXjy2sG3', 'qX2dQW5JBACUXdrB0tw', 'z1bJcI58oLA7xY6paRN'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, aoESDvvHflsy1PREijn.cs High entropy of concatenated method names: 'odervpgFCw', 'ggWrKuXZMX', 'gnlr3GBcGL', 'zcwyLaS71KViECpqdV5', 'dMD7a1S0IfQxYCh3PKH', 'aJGdxXScnq01CrBUHSC', 'HEY1iNSZSdusDNNyATU', 'PeL9gESd0qR6nKucvWg', 'BHoiuASGcjMeL1lQGYG', 'EvgGyBSJRPFyxuq8NCF'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PecDwktA7vOoh6WQMn.cs High entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'wj4JxhWcMWqShjstZHB', 't7kKRcWZL4aUuBSrDys', 'b4pUKIW7ClRtfekBUX0', 'NOpN5AW0JZEhovPDPBs', 'CgDW0XWd9IgC5sEnAkF', 'Cq89jaWGX9nFRj1bh0O'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bsYIHC9VlusmyTqEt1o.cs High entropy of concatenated method names: 'uP1l0EWHi8', 'qftlysWbuM', 'QCJlQXAjfeanMEkJVZw', 'xkA28hAlXebVS74YGy8', 'MBxuQrAAFIKPhlEsvTc', 'QMFo23AmJkZo7AmdLop', 'hW5MUDAFJTBuRUbsOAf', 'pSiwjKAh8mVSu9pAOsW', 'xqpF2sAc5BqGXPMxsyR', 'r2GkdZAZRGr3dBjgQQv'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, AtZO7HD7LggNi3T57O.cs High entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'I79TkhgkLC9n50XsP2E', 'aWvLOggfITFSVoBb3uR', 'KjhJPOgzNOve4fCI8DV', 'cJIABoNx6BaFeT8GWiR', 'l6fMNFNrpBdU7WXOTC1', 'hI7weRNgT21L48Nq16g'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Of3qevGHECnn50JMJo.cs High entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'fnqmV9UA72hIKKSsHTY', 'wG4fwDUjGEq8qyNatGl', 'cPRyB5UmwMjQZiSlayG', 'pB3n8HUFQYviSntviLg', 'V9vhPeUhqHKc4Lm7Im1', 'KGieKLUcbMXnH5HHVVS'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, gg2GRPlxt5O8H9qFbHW.cs High entropy of concatenated method names: 'O7gKS2GRPt', 'VHfqNb7kcZJI05PbLai', 'd3NqM37fylmvgZBhcZ6', 'YDVUiV7Xj83unNsQoBL', 'fcknvx7tPe0u9S6gxPl', 'LD5WJC7zsgBhiq0tvTx', 'wMumZZ0xrxugPqS4Py9', 'JUy0Zv0rj7XRLmLT83p', 'eZS9eS0gSQD5Bixxc6C', 'WRmjrr0NoX9CwUNGRIo'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, uWJtAR9o9PjlxWL4lFK.cs High entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'dEOkqMyO2PNCOH7Ho5L', 'OjnainyR8Fjwc2dQ8Wo', 'YU4tYKy30h63Qlvtdhv', 'hN0CNRyX4IG1hbo8eOn', 'PQVIb2ytRLWTYdS36gq', 'xZaelDyk1pPH41YXo1k'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, VInybP7k0ixBkseEAD1.cs High entropy of concatenated method names: 'Tfj8NKmpOh', 'bSx8k7QxNU', 'oyt8d14TZb', 'kce8OSFEOx', 'S0I8a1Ro3k', 'CIT8q6x0v4', 'N3Q8SeFqo9', 'UvA85rNyMc', 'llC881TTGG', 'NGm81vY57R'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Jmiyo69tB8oRYqcLHMT.cs High entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'TpOS1pAb8ng9tqBEV49', 'TitlTMA4mjbVMucuZRS', 'AdFQaHAnZcdyqa7s0uV', 'PgJPTtAQCBrLKibKFOF', 'XMLH74AP9glh1SZ2mcK', 'SlZ9D6ALo0ii6xUKoew'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, CoVvi9lYLyxTnXKOuL2.cs High entropy of concatenated method names: 'Tns7kpWlxG', 'lewTyxdIr3OkTTobvQQ', 'zIUEKudDT9dCVKMfOLq', 'dJoCNUdVLyS8JYrHOoc', 'nGt0OkdMNGE7pYjnp04', 'XgtAsodOAIGX1PFS6t3', 'NeN7FjSBUH', 'mAL7PaG99L', 'NO57ULQC3Y', 'jt77mG3Qjb'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, SRPF5B3uChleNW0KYcq.cs High entropy of concatenated method names: 'InMZ4KTU5ZoafkUaiAK', 'trVXL4TWs8trW261SpJ', 'SCxCS8TgZjO3E2Y5Bii', 'yqf7PLTNL22pB87Op9L', 'kDjOxAxSiJ', 'WM4', '_499', 'wY0OD48yL3', 'lEqOBAmhcV', 'LkROEBI8ff'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, qerjpp94FVH9SYQEuJe.cs High entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'FdZoIBA8OoLwYY3W5wE', 'pUrkuqAw2Nt5rc6fFjf', 'rOJBvDA51ffNxxQMoL0', 'jXCny1AKuHSatEDppjr', 'aHUdrFA14kjfP4uEQnL', 'MMSS2JAvnxhZKH7MRT6'
Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, RWBK019CF7nUcsTZE0b.cs High entropy of concatenated method names: 'gt5l93NGes', 'KALllYadky', 'nLTlRmROYB', 'ypMkn2lMBfeVM6kSdvU', 'yjbd3IlOtB7JkanJqJs', 'z4KRunlVrRX7QFmEOw1', 'uxLiWwlIWbAcMtlu8cC', 'mpW34ylRUVR1Oo0ZuQ8', 'qmCroJl3LHM8X7ivlQZ', 'aNjthVlX8PAqnFR2ZsC'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, v6luaK3qSQdG78Cyn9Y.cs High entropy of concatenated method names: 'UbyOwveBBZ', 'OeNOXiTnsX', 'xhDO0B6XP6', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'WbfOykEdX4'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, pC7UlOvJvi2hqAkL1D8.cs High entropy of concatenated method names: 'InaekceOgP', 'CXkeOXy8Iw', 'jUFej3DsLU', 'USjei6u0yo', 'RRieeQJHf2', 'W0OeoIfJdo', 'XSJeH3qTdG', 'GnYefWlxQt', 'J6qeF11k6K', 'jPyePgINBt'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, rmnQxrKweXovxmYFfo7.cs High entropy of concatenated method names: 'cchNUIkh25', 'zUPNmOjQPP', 'qIJtIOPRG1ZjvXiH1qI', 'mG3Hf1P3cSRYYytdcXP', 'k5OrShPXjSrcIKPLShu', 'Yf1mLSPtaFUUp5bvmp0', 'y3nrD0Pk8RCVZA9NTqE', 'kdLJ9PPfxy75un1r0M0', 'bwoIcUPzudKKsLwKOBl', 'eIwaquLxYE5QaMI2sZn'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, N43Em13sOK0bOJdFKYn.cs High entropy of concatenated method names: 'PJ1', 'jo3', 'uLbSwvYDkJ', 'F7kSXo5Oq0', 'Ye4S0ejdP2', 'EC9', '_74a', '_8pl', '_27D', '_524'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, EEuZ9r38tkfgiKsc6S5.cs High entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'FAyOkJskxn', 'PUYOd208e9', 'rfxOOXcpmM', 'f6rOaDuBaH', 'lktOqeFjmU', 'uv3OSMaq1f', 'n36wJviLJSCZkVIRe71'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bpHPos9OBbZYq4VcBpa.cs High entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'oR90DvYf751JLVGVH2I', 'OpbxXnYz9Q16Rs8bpTf', 'GposnRexhWIGTr9BHTW', 'U95QuMerdImuIqIV1Ak', 'mLjsyiegIr0cj1ECjZw', 'pX2qL1eNbP6LFUMrb8Z'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, miph6a4RmaFZ1Nl1NL.cs High entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'efuPsWWpJqBijSMTupx', 'iZNWhZWyYcpBcPkS59V', 'jumLsRWYBuDggxwt2jp', 'kXZdb1Weu9xqVlesb44', 'z8ljwlWlCXFredEF7ml', 'DNq2YFWAlFUf4Mm9y6l'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, t4CLPVs2O746c94BsC.cs High entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'NpbC3ZU0p5NkaIktSx5', 'oTGmtLUdZ91AeqAVlIC', 'W5VvsXUGIVLFI0QAfVn', 'n7creJUJsBerPLqj2JI', 'IkKqaaU83biX38lY8iC', 'yJ0Yc2UwhDNBvrSuwOY'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, YKi3fZ9hlb310txy1Nx.cs High entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'TDN17SYQ4qWF0NvupFs', 'AhdeobYPubtuci9IuGJ', 'BGsbkxYLGUE2lyfxMol', 'CxXm5jYabGXEy1jwc6l', 'frWUSTYBtUkRC0Te2vS', 'Wkv6FnYodj5P7DdQrcB'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, SSylUP9EuEheEVLMLoR.cs High entropy of concatenated method names: 'tSK9W692gs', 'aAOlp0lLcNB4TYQckAS', 'KtNQojlaTUIk9ytOT40', 'zG1s5RlQrBNr9yOoHQm', 'W8eiMXlPAo06WJCnY4R', 'jrTPDMlBULIWwgBQM7N', '_3Xh', 'YZ8', '_123', 'G9C'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, ngF7YCRzpDtcgD33ll9.cs High entropy of concatenated method names: 'hqeXaX3rRb', 'lyrXqmtEXt', 'jBeXSG2g9X', 'GeWAIM191yrIR7LIPxu', 'htlZbX1i2ajK3BLNi1l', 'wxEibH1B3iYH9Uelhmk', 'TUfEhl1oGUqBxp1VsPW', 'iQPpZe1TxySbViodSA4', 'pUVMJq1HwGDIcthXSxi', 'APR4wf1srd4wmi2wnhg'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Ff88SRvmh15s8qMeoS9.cs High entropy of concatenated method names: 'zatrunhjW2', 'XhXrxPBiK9', 'Fj0rD95WWa', 'KJtrBkcv0s', 'BowrEfsyQE', 'C4K08fSQnd6EpLS9WPX', 'MVBux7SPGPAUCTasrn6', 'iLfGAgS4lv8RXgFXBR7', 'aNJ5xhSnm0PcMTJ1lFs', 'Nh4ZUYSLwl1Ks8DstFr'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, wfmoFF7hiRD3cgB0IB.cs High entropy of concatenated method names: 'toFjFhiRD', 'aNIQtr4UNoIW4YXPDY', 'dJWV3x63FI3nIGZZY6', 'NaH0WLba30QKdVZ1K8', 'vaxaYHn6caHt4oyBWn', 'jjc89tQ8NyExDy1DXx', 'VCYlBLvOI', 'uCERqN71G', 'IGqv92bCq', 'jp1KNowJ6'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, n0t0pSlTO21awwWGEMh.cs High entropy of concatenated method names: 'piTvm04MpM', 'FVxvpl6Feh', 'O29vTElPEn', 'dgVvh7XuGZ', 'qiNvNXq2k1', 'dnAmgQZxmkjM05ZNAW4', 'wnVRWPZrnXZAOjFWu9x', 'OLFvLKcfL3OTtLUUSGn', 'UqlkV4czxp6kEFWui1B', 'xFhyK0ZgCReDkXMUVFa'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, s4k6M29947Pd4eU9gQX.cs High entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'O1mXrNpGeywXXCHv5hG', 'PdVPW5pJGYXZLTfdVAp', 'RYcxgup8yu8t3msQRiK', 'KFXH3hpw1dbKdeyxG1E', 'KYbpQtp5QekFTQAKu5A', 'UbNhxlpKckVmBNhbjqa'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, aUhb82JNGmSK692gsl.cs High entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'Cx5ROSWHMYC5VC6oCnP', 'Urrjs7WsPAjJyc60TOZ', 'Mhw0axWq0ZDKGFoGHs5', 't5JtcCWDv1rLQkormq9', 'BSOvW9WVP4ayInFXWuG', 'VLiPeXWIfgnJnw8Tvgq'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, RNPKDLRgnTWovsb2PfJ.cs High entropy of concatenated method names: '_269', '_5E7', 'PQXAY7VWLI', 'Mz8', 'yohA7TleOU', 'OP1F14KMF4kj7I4bm5Q', 'KTt6cgKO3RuPk7vQ8aU', 'kEl3iAKR9ON6jrrD1KN', 'ha1GFeK3RyCXTPAArw5', 'muffLoKXqwKU5kwGwGF'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.cs High entropy of concatenated method names: 'l25liIsSVRAXkTxhLoT', 'kRCHdrsCZmYs8K5oHpY', 'cTTwX2s1iN28bgeyNcP', 'LGr1r5svF1wdi82OCj1', 'Fcl8iXx74V', 'sOHDvOsuClk44daZQ4g', 'ITwhOPs6YmOKYDicVB8', 'uG4K4qsb0xa1LiMrm47', 'aKhPols46I51NIIFjjh', 'DkSo2msnJdwGX0u8XoL'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zBhiTPvKhTWbp26i2p0.cs High entropy of concatenated method names: 'pY8yHFUs5G', 'aUCCrsvdwjoMe4LBmZZ', 'SjOoHVvGoD9gA7bhYmr', 'rhXaAxv7HkjLAKVVa4a', 'bejCuev0EgmIHetNxmF', 'BARX5oQXfK', 's9xX8C9TXM', 'v7vX1ol8mo', 'OYiXu0FVCX', 'R4XXxYYjao'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, LqC3sHlqHwtkwo6WEcx.cs High entropy of concatenated method names: 'mnqvWGuQpD', 'I3gvYhqYsf', 'MGRvznbE1i', 'ITiK6o6LT3', 'dyWK9K3kSS', 'ybHKltf92S', 'IbtKRNuRTP', 'GNbKvWoAlK', 'u9PKKHe0t0', 'x9mZ5fZ3x5ZJG68aGVV'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, x53ABG9f1owHDDKBaS3.cs High entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'qV714oYxEu5IA2a3IyF', 'tdCyEVYrg90xmuk4ey3', 'bwC1yfYg8T5ahHZGFaF', 'LrLyhWYNYKnYVp4WCZv', 'kCOJKvYUdWmWYgv5nkd', 'qNKUBqYWEbuDaorAp4Y'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, vVOmPGvrq31DO4wGvpR.cs High entropy of concatenated method names: 'R5nyDoZ5tK', 'DwTyBrHcuW', 'kk9yEV8q9Z', 'b9gyIJCf9Z', 'EeuyctOC8U', 'jRTHRsvfDsnDW4YldbC', 'LXbZTHvzS3aRgR9ypIf', 'tQHYTlvtoJJ6V43XY8w', 'nhcgyQvk9bof5Qmiq6d', 'ixvoDiSxBCp6UFJKX25'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bIFPV1lcgwYDSDD5lM3.cs High entropy of concatenated method names: 'bUo3Z5cfiR', 'gCx3wimkVY', 'qfuKiS03euwGOCRsh0W', 'BMIA9Q0Xq5UEHcenUUI', 'dtHJU20OQiAFIO5ANvA', 'E5ecsj0RPxCCbXlN4Se', 'oVv3Hi9Lyx', 'vrioWWdxPAAeEAOZh5e', 'OkLqyudr2pemMUuLDdk', 'SmEmKA0fUF0UgZYyBEc'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, JeBQwbdky5DS6jtXTP.cs High entropy of concatenated method names: 'WHsxJy1sc', 'u2WDYPxEk', 'aHmBs3h3r', 'ege99wran3LKLhyMRgP', 'i9kMHprPcg7MLdfjQrS', 'uFaJDVrLJbcmY4mMoMt', 'c2rpZnrBoiUKMnDlhee', 'gIBPDWro1FcnGOkEtvy', 'yebZsKr9hnYS0xnOuhX', 'mhmQE5riEYTBa61AsV3'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, qdhFZ8R4DvSTxeWyhpd.cs High entropy of concatenated method names: '_9YY', '_57I', 'w51', 'i55A28VT4E', '_168', 'wh4ZssKvk0oUHRnpIPh', 'pWB19ZKSXxIDgPLmwpM', 'Fqn38NKCyuOckWts74a', 'zoMDN2K2u7HS2s9nuZw', 'brUvuJKEEsPq7wABrSx'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hDc22q36rjYl7cot4V2.cs High entropy of concatenated method names: 'Gh5kLPB2Ov', 'kFnkVYtcxi', 'Gdrkno7VIK', 'TH8k4bfWZ6', 'lXtk2XA0DL', 'es4ktcEykF', '_838', 'vVb', 'g24', '_9oL'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, gWl6xsRsO4F1ET3XU7j.cs High entropy of concatenated method names: '_5u9', 'hLLAwVhSAi', 'KM6X61hMyw', 'WrwAtwsyJM', 'mCKeOY5tXQeMwS6MiHG', 'v9FKKJ5kQ9RTBpF7hye', 'GCBKyX5f1waRepCJ85T', 'TrVFHr53drf9y9BDftT', 'Ba8k165XPXWXtEIPSsh', 'KB1lyd5zhIZrA5XYv5A'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Kt2Y7f9q06pPifGXJIv.cs High entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'OF6sUBePE6BtaE3Kuth', 'jo2OSGeLZQCihT7DSeP', 'bTYDhYeayv0ue773mIo', 'tISHVAeBJK3JyVTc0WR', 'XUbls3eoaS4tr8O1Zld', 'fKvWaue9899EEIL168C'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, OoKQBd9PQOIINrUiJIJ.cs High entropy of concatenated method names: 'nvH9SECnn5', 'EJtkr9Y02dd1A38WfQl', 'XlHpHOYdWQf7eQiK3TE', 'WVUDHHYZBVdAyebjYG9', 'lG30BEY7V9IcpZdKkVL', 'jf43DHYG4UQNuA9wAeg', 'wDNYDYYJJOjAGWOYYHM', 'OoP7uAY89U3psKsYPh1', 'C0ckiUYwef8IS4J0kWI', 'f28'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, tUR51qRtos8neeSCfCF.cs High entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'KRAX0V5agb', 'pBIAOwpU4N', 'BVnXyNYHGn', 'QSmAdTpoPh', 'tIS4B5KaehkqaEXNWVO', 'Ek9kscKBa9VD0kLhBRt', 'KTxkDuKPNsRwAANJxf6'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, s6gHsPvOqP2JDMQnOmc.cs High entropy of concatenated method names: 'J5yjuhKgDq', 'iILjxvlJMS', 'iv5jDGxkJ1', 'aPtjBEwN4V', 'YP0jEhUOYu', 'R0kfhECGxgpsocX10dM', 'NkwZHtC0HtaO4Q1lUQq', 'EQQQPRCd2INaDLUgP93', 'WbfQd2CJ2MQlmW0EuGx', 'RP9RK3C8hWX6nOLiBP8'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, VsKPJfRrqU3kOWT58HW.cs High entropy of concatenated method names: '_223', 'DyYk3t8078Xls8GcoPP', 'FfYd4F8d8HoBmL5CqR5', 'Kskasr8GaKO41fREd9M', 'HuoGNd8Jm5tuSa6awmA', 'oUExc688tSyeHKK1Utc', 'YoDYYH8wL1wwGyrAPgO', 'INVPkY855VEwi5Hk9wo', 'c79KOZ8KeBDh3NkbVJQ', 'IT8FCp81k70nebsS7fw'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, qaeqiIKANYedU44nENd.cs High entropy of concatenated method names: 'vT1kvNUqqj', 'OmTkKTboCX', 'YXEk3hbTqu', 'MPDk7suR6d', 'a3qkZk6930', 'ztpkwYWJKy', 'rhnkXmkoqO', 'QG2k0fm6gG', 'ScrkyvZfkt', 'CBhkrbdtO3'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, q91kAv9rFvHpicluOel.cs High entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'HaH8HHyCXGop8YKgc1a', 'APchiSy2kqWw91PSEOi', 'GZ05PByE3sk4o0EOdv8', 'NhawT9yuGjHFVrCrgEk', 'Ir1woFy69AlQfLYVGYL', 'lRfe8mybEU5OwPbnAHD'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, wyJFCl9x9fYR1NwiG31.cs High entropy of concatenated method names: 'F7E9gcvwr6', 'MUfj3Ul1pG5vZJ2Ev1w', 'GnXQUwlvbLFmx0ghYdg', 'l6S47Vl5JIEZ3oVoNB8', 'Cplf9RlKcedFKl2UfKh', 'fk8aCIlShZqeJ5obuJr', 'QLw', 'YZ8', 'cC5', 'G9C'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, aTrJGWKb56QoYmFQAQO.cs High entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'HVakhyUyrY', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PL0IiPRfXfjK4KIr5xd.cs High entropy of concatenated method names: 'hfOZQykpe7', 'X0kZgyn0Ye', 'iGXZAe2Oy0', 'wFBZJ8TVOm', 'sGqZb31DO4', 'b3r8bpwpvlVFM1YtCxV', 'DZdmsgwyN68LpPpt5vZ', 'KEa5NUwUNkJeX94d9c3', 'AfN6ljwWAOI47SHnqPd', 'ohtw2dwYARJiUSnoAPL'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, lagxIU9pd3fOSXyoW5x.cs High entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'WZDHd9Y1dC2erxni2rA', 'hxgcadYvd3d5hqN9UXf', 'Q4QydsYSxFHP3O3Wte5', 'c6dh0SYCXf6Hj4mBnUD', 'g2SP66Y2dZMnKI0HJ5d', 'dR8NnQYEDpgQdD9cSd0'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, eKIJSugVWHhu7Ecvwr.cs High entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'kdmkiPW2ydU7yLhH4bJ', 't8cnxjWEqHYHYgAbFFs', 'SuDoaaWu6dHFxi8iIh5', 'j04Vc4W6fIkK16YI1Jm', 'jsGejMWb7P6bSG2oGb6', 'tEM3HUW4VHpP5GfiQfF'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, BMDE7K9JJ0GausKexUM.cs High entropy of concatenated method names: 'm3ElPMHjU1', 'n1sALDjpaBN183WFupS', 'msuOljjyc15pgkWhgdV', 'hn9NDOjUGxeQLaLWemX', 'gobQsUjWpG8wIqBRDPi', 'EqH8mNjYhm0J7Yt6iI5', '_5q7', 'YZ8', '_6kf', 'G9C'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, L3rkJ9v0wfOykpe7b0k.cs High entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, onxbvKvFYRiYgj2LUgx.cs High entropy of concatenated method names: '_7zt', 'UktrPhONEb', 'MrdrUBwe0g', 'bNNrmQgrLZ', 'rfNrpqF7q3', 'GoOrTfCYtW', 'NU2rhqvBE0', 'MtlJMDS5MlaZqhjEEhq', 'N5FKvoSKTM3xHTIlXhk', 'lihOZBS8JBwj3DG9768'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PhlmOO33kFK31SVC9ER.cs High entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, LRnbE1lUiETio6LT3vy.cs High entropy of concatenated method names: 'r1GvjPTNAP', 'hnJviL8UrN', 'm4iRFbc15rKk2HUhw5i', 'hnjdTbcv7fuxLpQMFBO', 'wamRGlc5ZOO0IGlEamL', 'kfk3IOcKQ6W9MRJxu3R', 'GSroIYcSvPKtg8OUFeU', 'jGeINRcCD4RcfnTSr5V', 'eBeJJbc2jvE8PTQU09v', 'MyKTBTcEZ90VNFlfU40'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, e2xI1uli2BvyPgOWt3H.cs High entropy of concatenated method names: 'cDIRJmiyo6', 'MG4UoJhNwPrQjI5lB57', 'U2Vo2shU57Ndo89Jev3', 'frcPyphrOu2UfXMBuXm', 'dT58OPhgNISD3n7GAjH', 'xuoR9XhWo6u6GQDCoUm', 'H4vWC1hpXC3YTFD5tuo', 'WH7iLmhy778ggBsjR1A', 'FqTw9KhYemN6TlbZSkk', 'HLasCjhe7UmZ9itjD9U'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TNvZay3pOuluj5OwSvS.cs High entropy of concatenated method names: 'J8NdUIO02T', 'QcidmRVOZn', 'TCOdpQ8OEV', 'wu9dTiTVve', 'BN7dhM0eZO', 'wTaBTbot6PnWCXSyrrD', 'tQN52wok6TMm4r0Z5nq', 'ymlroHofNXOrObjWJqI', 'JHshW3ozoYlE5aZ0FUo', 'FmaqX39x4QmS2KWLYIh'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, xuDPF3KRHi7u5qFcYsd.cs High entropy of concatenated method names: 'gOnlHA45JGQn4hPG3PU', 'lTDSat4KTMTCK0ha96P', 'sPU3l048oIvTtYbZNRv', 'esFxZO4wGtMvtUCteGB', 'I5oUN2uKC1', 'qsn9xQ4SAZCIj64X34R', 'PxoJPX4CeqbsOx2PAxd', 'xcLbJ341Aom3Ll00t5N', 'jYjPFa4vYwJ8I9fp2wm', 'EC9c1m42l3QZHL0UCtl'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, DLIptRcP5hqxvlRK7M.cs High entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'hEYIPXNXkXHK9CCajp1', 'Iluc2ANte7GTmMvoaS3', 'iUJmk6Nk5pHZiJLxWcF', 'ftCh5jNfmD04tmTZaeh', 'n5g0q5Nz7eb7pds2mTj', 'ca0AxWUxlNYxXD9JXmj'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, phqcKeK1mcShOwIBfct.cs High entropy of concatenated method names: 'nPdNQPeJDG', 'gUFNgbmaM7', 'oZqNAYtgN2', 'ywTNJHviQY', 'XXUNblJrN5', 'TKdNWheNh0', 'S70KeMLDLo1IHDhkKgI', 'huLhQDLsbXXVWhJ4CjR', 's7yMwnLqE57KuAPVsm4', 'KJUnoELVq59x1PWsslM'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, XYTvEgEdOn3VF2FFNt.cs High entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'kalFvjNPmM8SteyC0Q9', 'rvao1wNLof2njj7JelL', 'mVmDZlNaGWoPwvEiXQE', 'asaKdlNBWi4AjQ6uKr8', 'iSnoU8NoN3ZLogTK3Wj', 'W4Hr35N9QS18Oiy5eVo'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, USfWgM9YPEPl6et9gXe.cs High entropy of concatenated method names: 'AWGlTgtLEM', 'NfllhXZUOj', 'KVJlNJ1knj', 'gayaNPjAZ8lrH9wkeeH', 'Odud3ujeWQXsklyTimV', 'bxTdfgjlOgR8fBE3ZNo', 'LtMVQTjja0vtixpRajV', 'tSiQuljmXFiFuN71BKn', 'KZdd0NjF50xPW0CoVs5', 'rAk39wjhWhK4qBykGYh'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Q6dtO9KQg7t1MhAiPxK.cs High entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, jinINCvwU1Z6HGWbpLQ.cs High entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, EjwkB2z5TSBmyCSo1h.cs High entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'q5iZGMpNVPubTJmdLn3', 'zJcIOTpU1iONtROt9oe', 'Ql6soUpWpkJJjYuYN7l', 'zdah2WppshZuw3Obsp5', 'Wb9iWtpyttnjJxVjFMM', 'iscfADpYGHYMQYZXcof'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, gPM5LvW7t53NGescAL.cs High entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'MY91KRWRHimB6F9SG6k', 'Jyq2QqW3JQpENsFN6wi', 'KHPDrGWXOwSyJu594YP', 'N5T8AdWtM2q9iBBxjES', 'aGis7LWkSi7agLi6BCy', 'C5uVPVWfgQkBaxTf8qX'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, OVytoBRJkkB8mvXG3th.cs High entropy of concatenated method names: 'TlPHTQ1Lr1GVEauAnGd', 'aHX1jg1am4BwchPEu7b', 'YovKSi1QEsJeLj8Ljxr', 'N9dTp71Pet8d84ifGPn', 'IWF', 'j72', 'q2JXHOEhHZ', 'WYlXfOxxmY', 'j4z', 'gFcXFagpHr'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, sTNAPZl6nJL8UrN5G3c.cs High entropy of concatenated method names: 'fm0lkCaThQ', 'XbEldbTxdU', 'c4hlOBadqX', 'kM7nkHj4DN1WeYc4yfO', 'QpOGsWjn5owk6jbJGWi', 'YsnsEQjQAYZbdR0mmM6', 'BQEiSYjPag90a8PUBlL', 'w1mDG6jLFi9XTIrELes', 'fcReEUjaPC1L6LKOkOA', 'hJ928ej6wXw3jv05kvR'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, eAIEiWRGuT0DLdJmEdh.cs High entropy of concatenated method names: 'sg9', 'EkIAVk66FT', 'Nu3wWtnBd9', 'WKhABR6MFT', 'AkIqS15Dw8YD35ppHPm', 'kOBkey5Vt2bXkyT6nK7', 'sVcO5M5IQAhDYS8Dibf', 'cjPp1H5sG6ylnlvPrfP', 'KMJv0k5qV4cmAGElitI', 'ahdtKU5MJIGOusEr0ZR'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, rq0uC4T7MAii88bDUZ.cs High entropy of concatenated method names: 'RG0N0ZYOs', 'eK6kWD0Ph', 'uo4d8pegH', 'KOoORVZT4', 'NBYa1HoDK', 'ryjqNo45j', 'qL8SjbWuD', 'H7KAv3rYYMbV6L9iyQH', 'iYeqm4reuAdY7LpBo9X', 'f7kFXxrl472QpMLGNrU'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, BHA5ckKxN1RpEYO0A8A.cs High entropy of concatenated method names: 'wjrk6CPXEY', 'PVkuHcLtlAPVveO1LMe', 'tuM6WRL3GG7vIT1o0Dg', 'u4tpUrLXTQDx7wUqCWV', 'Dp68nULklx7Lf7Po4cN', 'Xvc7EiLfeKGfPywgvM4', 'TRhsE3LzaOXyPmelpdZ'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, mrhM939KRaqZJpAEAQQ.cs High entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'AYu44dpsNdAyGhObePU', 'UgWrWUpqvhv6l9ayvbv', 'yP7ImipDbPWLjJT19xb', 'bCGo3RpV0BfNA9jo4y0', 'krc2krpIX0YiB1eoL6u', 'bA8sSspM9Rp5w0omMW3'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, LaD94W3lE6s9EXDgZOf.cs High entropy of concatenated method names: 'a7ydZGrQIx', 'khOdw6HShW', '_8r1', 'UDpdXw4kTa', 'I07d0ldRwA', 'UZWdyfJgpO', 'xsrdr86OEn', 'WnwrdGoZyPxrLQBJlt8', 'opKCORo7PlCfXwAIUhv', 'RHMpeLo0EV7rW0ZL2re'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Qhvj1tRVCck9P2urqru.cs High entropy of concatenated method names: 'oYo', '_1Z5', 'EgOASKP5h3', 'vtcXvLkGQP', 'xCZAIl0I8E', 'DJGvfgKFHwvyQTc8CEx', 'X8yp41Khjq5oul55aXs', 'dWD2pOKcpYHREry4Z0N', 'Msu0s4KZWQ0XopUxgae', 'MUIk9DK7kMp15rtTNCY'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, X1ksjx9knfQstQDiYaY.cs High entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'AOQGf9YqA1UIT7lv1Xt', 'hj6w9AYDr1U192NRB1N', 'HuFlk0YVji1x7cmj54w', 'yYa4GgYIhTVF35rQ6RF', 'xCTNSwYMusFg2cb8627', 'Nc0lcqYObTko5cJGct6'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, x9V8q9KYZ99gJCf9Z1e.cs High entropy of concatenated method names: 'Px9kaBludq', 'U81kqfOCt7', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'DjVkSnXNMf', '_5f9', 'A6Y'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, AeHf0H3200N8F0h8wpX.cs High entropy of concatenated method names: 'y5lSTMUUv5', '_1kO', '_9v4', '_294', 'Gb3ShMLE4g', 'euj', 'XeRSNmdR9p', 'uToSkeHpkY', 'o87', 'reYSdBXeEv'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, x2GEZo70QclrbHZJC0W.cs High entropy of concatenated method names: 'EY3YE2uu2c9iW', 'Po7KbWscbaHFsF6WQCs', 'fdCM4BsZPi9NNyIDfAp', 'iHMsMSs73oSHe03k5Bt', 'mdEEvts0sPu0fQkUUQv', 'r5ftS7sdocAtDbJF6Rt', 'EhXd9GsFKeNhLCBulmd', 'qd9BhGshX932ec2aFUL', 'oQfl4AsGaIeUVhR9njN', 'tamlDisJeCAEsF9ERBH'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hAOp8OR9owXPgPYp5DS.cs High entropy of concatenated method names: 'lUE7SjZE8X', 'qTj75jd32Y', 'i5F78ixgXF', 'xt771YwYTs', 'UYLco7dzUUt10rOtJWt', 'uvSlWldkWXSW6ddtJVH', 'C86E2mdfjh0BUNm7lHC', 'HSEAShGxWqsinJE1HAs', 'jSl4sKGr6yVX4hAKJ7V', 'Wk1IIGGgKdjL5e4wHdV'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, N36yYH3OXgUyXNSpeM6.cs High entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, O2gvDU95NOMAlPJ66JS.cs High entropy of concatenated method names: 'vKg9LxagiM', 'zUMPhflgnjnBjSHYVaG', 'WnScjSlNcyVCjJSSxni', 'PfUKWJlx8WM0Lr1glE0', 'X5V6hrlriNlDDw3d4vj', 'p54QFxlUEhacfWlvNHs', 'bB1NX2lWY8iWnrcxoEt', 'wVAtyRlpD2AAmr42H7C', 'hkA9n7vOoh', 'YVMt2aleGiwN7YA3vRe'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, RHrgSUlFJHPGi4SFpy2.cs High entropy of concatenated method names: 'M7yRzIqi4n', 'wU2v6E0Zrv', 'peMv9GgbRF', 'ILsvl7Rb6f', 'nOrvRdAgSM', 'HE7vvKJ0Ga', 'FsKvKexUMJ', 'eQxv3jPKUX', 'ituv7DIGxW', 'p7OvZrfWlC'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, u1OIBIRiW3RmDFyC1is.cs High entropy of concatenated method names: 'YyrZMZ6Vis', 'vsTZs4QOqX', 'Ss2ZLg45rh', 'jinZVINCU1', 'N9KmDv8nsUvdVr27GcP', 'DbFkgD8QUhye42LAKoZ', 'SZ7Lcp8P0Id4ItLNfK3', 'TLIunf8bwoI8dn9Dhaq', 'k4S4EA84YvOoMri0tjP', 'ARFvRa8L6eELV8sva7x'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, nX3rRbvWryrmtEXt0Be.cs High entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, c4hBad90qXnMVQO8Ubp.cs High entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'YSwxdTyG4talWObDOMc', 'OZ0AbSyJOthlJDMHL8h', 'lgBl24y85f9IRRhj7UJ', 'oREoaMywsQ16MClkGYU', 'HjTY8gy5CaI01lUudDl', 'Ru5LoeyKBNQ17VjRoYw'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, h3LYx29iJMw2kCMi1e4.cs High entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'JU9wG2yBSVJ1uCm3oGp', 'XL0qkGyoMDMUucEcHj7', 'fq2CCSy9AFLYhrGPhuC', 'rUgRWryibVLDKtGloyN', 'KWRStsyTpgH0DyLd1lI', 'JfackfyHb68M9fLq7TJ'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, SRe90Hv2cbPqfyBf2JO.cs High entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'gJCie0Wewf', 'k89ioxf6vw', 'r8j', 'LS1', '_55S'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, tIHideRpbh7sVl4tMfy.cs High entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'zSNvRD5Fk2mNERMqahM', 'mCpyvT5hu8wXbF2I8f7', 'x4l0155cfYyw2TUNWFN', 'A0vint5ZXerNOvmvTuC'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, H9kGRDulG42C0P2ENw.cs High entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'rGSM1Y9mD', 'lVP5VhgQUgrn0WFqRbs', 'TSkwCFgPVKbh3jrhmJP', 'tn7IKKgLd3qHLjiBgJP', 'SwGposga2DRfwjDGmb2', 'Y73KRXgBf7tq9IUwnBk'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Dy5bm1lHtULYyswFZHT.cs High entropy of concatenated method names: 'pMTRWUrh5F', 'NcvRYFLZ3n', 'XITaTyhGaykpKsI2YmS', 'sHW7WShJJJdH65DQYS8', 'aJx2NOh8WjSaD9GcXZk', 'mJN0MqhwyS7QvtxsLnc', 'nvZchmh5JPBBart817K', 'mRvSN8hKgP1jhYGlTgN', 'PwiLgIh1vCw5Yto0mrm', 'EBoOp2hvmg36y5dhITU'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, ebQm693BTWgIeWA8YnZ.cs High entropy of concatenated method names: 'ADqqEBvAq1', 'L4XnogTuweZIemqPxJb', 'iC71wIT6KG0h9ZuGm4I', 'N6VceLT2a5AFO46IllV', 'WH1CYvTE93dICgqcIi6', '_1fi', 'TFDatqh3p2', '_676', 'IG9', 'mdP'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, sJuhRilllHaHsYLl3yG.cs High entropy of concatenated method names: 'NjulnYeklG', 'ChLl4oKQBd', 'TOIl2INrUi', 'WIJltp3QJd', 'CL0lQdRiSf', 'xT1lgakJAu', 'mjT7Hlm0083o6xnXqZi', 'khE9G1md4Z82kS47Doy', 'yyrxALmZYQbFgB9q2bj', 'qInGbHm7rj50b3gDb7T'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Kk2UoY9R3o2OILLuSZa.cs High entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'qcv7RwpuIYEaQWfahxf', 'rmXJNDp6g61cqgoHZce', 'Q0c5kXpbWL6EchsLyl2', 'EOcyiNp4suKotc7m1mH', 'PDqymgpn1SkmF8r2f0A', 'rZ5oXqpQ96slwwMmfeK'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, m5kvJIRvqQ6vk88BQ7d.cs High entropy of concatenated method names: 'erA7GowVsi', 'ctD7M19yAS', 'u3P7sJvRTj', 'fZU7LEpvoE', 'ooL7V02ywn', 'd2n7nfIWX0', 'iHgi1EGEp2NooHvRoxX', 'QuAGnqGCQ4FEtAtfPTP', 'N6pgo4G2kBaABTBj0vZ', 'oDODUKGuZKpEqqrHynX'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, KQdiKeKO1yr7g8kh4UY.cs High entropy of concatenated method names: 'ckJNI592mZ', 'K7INcB1Ylf', 'QYgNC3Gahk', 'OyTNGvFOKa', 'lFJNM1bPk3', 'bHXHafL2Vbgv2bETvyT', 'dvlndsLSxsfPlBC4gSy', 'VR5PAcLCoiv4RvJfUek', 'hA98pMLER4vPHmltxil', 'quN8TkLu0cTSH8UGt7Y'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PgZXc9RXyTK9oTr0lMn.cs High entropy of concatenated method names: 'IjKZu2xpR8', 'HeNZxC6oi4', 'SHlZDqaUq0', 'mWa5cB8hDZkuDqR4rw0', 'e9doOg8mP8rGJgWL0Nn', 'huTXJX8FJkee9QyyjH6', 'Jo0uK88c7DnHloLVYxB', 'XovZesb2Pf', 'WTPZorSu4x', 'PJWZHSKqUZ'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, uiKX91lEy27eHmxVmOh.cs High entropy of concatenated method names: '_0023Nn', 'Dispose', 'F8qKxEyjGC', 'yIoKDypiKX', 'b1yKB27eHm', 'GVmKEOh5aJ', 'c9DKInNSmN', 'Lt8RRT0eU6Kb4mMTIQW', 'cYYG0u0lv8SwcDWu3qG', 'rYqg5x0yufeFQkAFjXP'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, pjU1xV972YyawOghLYj.cs High entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'CrvR36p351q4rtc9MEp', 'PlWrB9pXJY40832LlfR', 'aLI4fkptjIRnKBHdOW4', 'qQxLtrpkMWpUvNfk8Xo', 'Oj3i76pfUwwXTGkCkDY', 'HeJo6rpz1cX1OoA1IhJ'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Bi4nhU9g2E0ZrvHeMGg.cs High entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'SmngsnAVw28tbT0ejQw', 'll3XFPAIeQNFJuAKqOk', 'biVlcIAMOhGqQxvK66w', 'yIx13mAOBbmQALeiHW2', 'JYb2f8AR1YKhggYtV1k', 'dq8n9WA3QIc7b08YwjG'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, mK9uj03h95WWacJtkcv.cs High entropy of concatenated method names: 'IGD', 'CV5', 'DEQdNohDJ3', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, t0ASy73kLI0VDtXhKyu.cs High entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, JMMflX9wZUOjcVJJ1kn.cs High entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'Ek5Gt2yyrg0NGvBE7oK', 'SAlkisyYhhPtxSgrMSi', 'QV1jO9ye92e75cK1L3g', 'wvtKcrylnbeM42HDXVn', 'GvKjBYyAVca17aehr8C', 'n38Sh0yjscYZ1P75nle'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, e9gKEc8j4ccPPjIvJc.cs High entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'Fyncsbus5', 'g2RtcPgGN71n0R0HLkr', 'QNiqeWgJjK1ZuFphij5', 'eUXmpkg8VbUruG6xdfm', 'Hklig6gwFaXNmCU2ldE', 'Kqr2RIg5YkmgMGbJQ2D'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bPQI7ERoRB9E7CghuZ0.cs High entropy of concatenated method names: 'TdaZ4hmt0n', 'i02Z2eaXc2', 'UeCZt3rkJ9', 'gMeFmJ8sS7DtHB15WYu', 'to4wbs8qFB8dc5yhvk6', 'LhWKt78D8gob7wjC5Ie', 'HMU1jL8VelvfSMtfOic', 'Jq3ZA78IZwDyxBOTuET', 'u9fi4i8Md9AChomx14B', 'bwsS8A8OtKOaxhxVVa8'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, WnhZCTvNt7pAc8upimk.cs High entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'SRPj6F5BCh', '_3il', 'ceNj9W0KYc', 'B9kjloN1c6', '_78N', 'z3K'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, FcG67VRPX0ukIu8AsNZ.cs High entropy of concatenated method names: 'Mm6wenY5uf', 'D8SwoRh15s', 'DqMwHeoS9u', 'fsJPB6wTM6IZvxSAyES', 'GTOLThw9H22ZOB4HrHl', 'F1Vkq1wiBpLfH8wAMJN', 'P6ASDLwHlpsXxCrteYs', 'S6ow3ESDvf', 'csyw71PREi', 'lnawZWR8E3'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Bx3xFGavu7JDAx3ga8.cs High entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'mPD1ZIgA9ytnne4gIxx', 'JlxTn8gjapJMj0uMrc7', 'TaSRYIgmQQVkJbAgJ3s', 'fw2MuwgF3dr1Dd0yf0k', 'Sq4Y96gheYYax2aZ4Xy', 'EiZAsOgcdfikQb6leKm'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs High entropy of concatenated method names: 'coWR1G1FuX', 'ml8Rugb4vK', 'D2WRxBK01F', 'gnURDcsTZE', 'jb9RBfxnXR', 'EtLRER4SPW', 'pxmRIQfxDH', 'Quw3QkF1D6ZG04dhJnC', 'MYd39pF5yOqpZpuGxvK', 'SWqtxeFKFxbWlrZ1FNv'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, jVvmDbVGlxm7LTy0MJ.cs High entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'ncuKyEUTappSDQKiNuG', 'XDpDlWUHFYK18FKZtEa', 'RDii66UsJwVn81M8oZZ', 'f0GZEIUqrYVxpGbG47x', 'eYR3h0UDVbB5DcmjexV', 'aUtIldUVBJVHjHvM1on'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, ncbOUZvgUIhYx2a4pMk.cs High entropy of concatenated method names: 'HJdiWLpD7s', 'OkfixJiUKQ', 'sWqiDjD03I', 'LskiBB5u2X', 'u0ciEgA9Hi', 'NNgiI3pMAI', 'mAcicvajAL', 'RLuiCyEitq', 'wb5iGJk6Dl', 'a2liMMJGWd'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, f4UGf9RNywmjIhFCXBq.cs High entropy of concatenated method names: 'Ox4w1ZnmNd', 'D2Cwu6vTpk', 'yVxZrq5dXJ2SILFQ9tM', 'cRE7KB5GPEeIcVL5css', 'Kf2w8M57BBUgA1hPKxo', 'ReYxjA50MqlTXjy2sG3', 'qX2dQW5JBACUXdrB0tw', 'z1bJcI58oLA7xY6paRN'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, aoESDvvHflsy1PREijn.cs High entropy of concatenated method names: 'odervpgFCw', 'ggWrKuXZMX', 'gnlr3GBcGL', 'zcwyLaS71KViECpqdV5', 'dMD7a1S0IfQxYCh3PKH', 'aJGdxXScnq01CrBUHSC', 'HEY1iNSZSdusDNNyATU', 'PeL9gESd0qR6nKucvWg', 'BHoiuASGcjMeL1lQGYG', 'EvgGyBSJRPFyxuq8NCF'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PecDwktA7vOoh6WQMn.cs High entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'wj4JxhWcMWqShjstZHB', 't7kKRcWZL4aUuBSrDys', 'b4pUKIW7ClRtfekBUX0', 'NOpN5AW0JZEhovPDPBs', 'CgDW0XWd9IgC5sEnAkF', 'Cq89jaWGX9nFRj1bh0O'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bsYIHC9VlusmyTqEt1o.cs High entropy of concatenated method names: 'uP1l0EWHi8', 'qftlysWbuM', 'QCJlQXAjfeanMEkJVZw', 'xkA28hAlXebVS74YGy8', 'MBxuQrAAFIKPhlEsvTc', 'QMFo23AmJkZo7AmdLop', 'hW5MUDAFJTBuRUbsOAf', 'pSiwjKAh8mVSu9pAOsW', 'xqpF2sAc5BqGXPMxsyR', 'r2GkdZAZRGr3dBjgQQv'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, AtZO7HD7LggNi3T57O.cs High entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'I79TkhgkLC9n50XsP2E', 'aWvLOggfITFSVoBb3uR', 'KjhJPOgzNOve4fCI8DV', 'cJIABoNx6BaFeT8GWiR', 'l6fMNFNrpBdU7WXOTC1', 'hI7weRNgT21L48Nq16g'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Of3qevGHECnn50JMJo.cs High entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'fnqmV9UA72hIKKSsHTY', 'wG4fwDUjGEq8qyNatGl', 'cPRyB5UmwMjQZiSlayG', 'pB3n8HUFQYviSntviLg', 'V9vhPeUhqHKc4Lm7Im1', 'KGieKLUcbMXnH5HHVVS'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, gg2GRPlxt5O8H9qFbHW.cs High entropy of concatenated method names: 'O7gKS2GRPt', 'VHfqNb7kcZJI05PbLai', 'd3NqM37fylmvgZBhcZ6', 'YDVUiV7Xj83unNsQoBL', 'fcknvx7tPe0u9S6gxPl', 'LD5WJC7zsgBhiq0tvTx', 'wMumZZ0xrxugPqS4Py9', 'JUy0Zv0rj7XRLmLT83p', 'eZS9eS0gSQD5Bixxc6C', 'WRmjrr0NoX9CwUNGRIo'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, uWJtAR9o9PjlxWL4lFK.cs High entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'dEOkqMyO2PNCOH7Ho5L', 'OjnainyR8Fjwc2dQ8Wo', 'YU4tYKy30h63Qlvtdhv', 'hN0CNRyX4IG1hbo8eOn', 'PQVIb2ytRLWTYdS36gq', 'xZaelDyk1pPH41YXo1k'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, VInybP7k0ixBkseEAD1.cs High entropy of concatenated method names: 'Tfj8NKmpOh', 'bSx8k7QxNU', 'oyt8d14TZb', 'kce8OSFEOx', 'S0I8a1Ro3k', 'CIT8q6x0v4', 'N3Q8SeFqo9', 'UvA85rNyMc', 'llC881TTGG', 'NGm81vY57R'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Jmiyo69tB8oRYqcLHMT.cs High entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'TpOS1pAb8ng9tqBEV49', 'TitlTMA4mjbVMucuZRS', 'AdFQaHAnZcdyqa7s0uV', 'PgJPTtAQCBrLKibKFOF', 'XMLH74AP9glh1SZ2mcK', 'SlZ9D6ALo0ii6xUKoew'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, CoVvi9lYLyxTnXKOuL2.cs High entropy of concatenated method names: 'Tns7kpWlxG', 'lewTyxdIr3OkTTobvQQ', 'zIUEKudDT9dCVKMfOLq', 'dJoCNUdVLyS8JYrHOoc', 'nGt0OkdMNGE7pYjnp04', 'XgtAsodOAIGX1PFS6t3', 'NeN7FjSBUH', 'mAL7PaG99L', 'NO57ULQC3Y', 'jt77mG3Qjb'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, SRPF5B3uChleNW0KYcq.cs High entropy of concatenated method names: 'InMZ4KTU5ZoafkUaiAK', 'trVXL4TWs8trW261SpJ', 'SCxCS8TgZjO3E2Y5Bii', 'yqf7PLTNL22pB87Op9L', 'kDjOxAxSiJ', 'WM4', '_499', 'wY0OD48yL3', 'lEqOBAmhcV', 'LkROEBI8ff'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, qerjpp94FVH9SYQEuJe.cs High entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'FdZoIBA8OoLwYY3W5wE', 'pUrkuqAw2Nt5rc6fFjf', 'rOJBvDA51ffNxxQMoL0', 'jXCny1AKuHSatEDppjr', 'aHUdrFA14kjfP4uEQnL', 'MMSS2JAvnxhZKH7MRT6'
Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, RWBK019CF7nUcsTZE0b.cs High entropy of concatenated method names: 'gt5l93NGes', 'KALllYadky', 'nLTlRmROYB', 'ypMkn2lMBfeVM6kSdvU', 'yjbd3IlOtB7JkanJqJs', 'z4KRunlVrRX7QFmEOw1', 'uxLiWwlIWbAcMtlu8cC', 'mpW34ylRUVR1Oo0ZuQ8', 'qmCroJl3LHM8X7ivlQZ', 'aNjthVlX8PAqnFR2ZsC'

Persistence and Installation Behavior

barindex
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Recovery\csrss.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\comcontainer\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Recovery\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Windows\CbsTemp\RuntimeBroker.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Recovery\WmiPrvSE.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Recovery\csrss.exe Jump to dropped file
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe File created: C:\comcontainer\SurrogateRef.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\Reference Assemblies\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\comcontainer\cmd.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files (x86)\Windows Mail\SurrogateRef.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Program Files\Windows NT\Idle.exe Jump to dropped file
Source: C:\comcontainer\SurrogateRef.exe File created: C:\Windows\CbsTemp\RuntimeBroker.exe Jump to dropped file

Boot Survival

barindex
Source: C:\comcontainer\SurrogateRef.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: SBIEDLL.DLL
Source: C:\comcontainer\SurrogateRef.exe Memory allocated: 8B0000 memory reserve | memory write watch Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Memory allocated: 1A390000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Memory allocated: 2E60000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Memory allocated: 1B080000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Memory allocated: 3020000 memory reserve | memory write watch Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Memory allocated: 1B080000 memory reserve | memory write watch Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599890 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599781 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599670 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599559 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599420 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598968 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598615 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598394 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598265 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598137 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598030 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597921 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597811 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597685 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597406 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597281 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597168 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597051 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 596922 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 596812 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 596093 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595968 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595839 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595714 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595580 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595435 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595311 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595179 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595054 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594907 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594782 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594668 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594508 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594395 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594266 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594146 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594013 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593889 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593761 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593401 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593271 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593111 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592981 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592861 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592731 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592609 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592500 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592397 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592268 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592144 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592014 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591912 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591788 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591641 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591526 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591389 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591267 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591146 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591005 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 590864 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Window / User API: threadDelayed 4857 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Window / User API: threadDelayed 4177 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Window / User API: threadDelayed 374 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Window / User API: threadDelayed 367 Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Evasive API call chain: GetLocalTime,DecisionNodes
Source: C:\comcontainer\SurrogateRef.exe TID: 368 Thread sleep count: 4857 > 30 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 368 Thread sleep count: 4177 > 30 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -24903104499507879s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -600000s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -599890s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 2912 Thread sleep time: -120000s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -599781s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -599670s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -599559s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -599420s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -598968s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -598615s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -598394s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -598265s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -598137s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -598030s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597921s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597811s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597685s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597406s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597281s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597168s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -597051s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -596922s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -596812s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -596093s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595968s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595839s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595714s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595580s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595435s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595311s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595179s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -595054s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594907s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594782s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594668s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594508s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594395s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594266s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594146s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -594013s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -593889s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -593761s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -593401s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -593271s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -593111s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592981s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592861s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592731s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592609s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592500s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592397s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592268s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592144s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -592014s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591912s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591788s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591641s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591526s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591389s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591267s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591146s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -591005s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe TID: 5140 Thread sleep time: -590864s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 6520 Thread sleep count: 374 > 30 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 6764 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 6844 Thread sleep count: 367 > 30 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 3384 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\comcontainer\SurrogateRef.exe WMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\comcontainer\SurrogateRef.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError, 0_2_0054A5F4
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW, 0_2_0055B8E0
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056AAA8 FindFirstFileExA, 0_2_0056AAA8
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055DD72 VirtualQuery,GetSystemInfo, 0_2_0055DD72
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599890 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 60000 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599781 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599670 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599559 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 599420 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598968 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598615 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598394 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598265 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598137 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 598030 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597921 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597811 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597685 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597406 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597281 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597168 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 597051 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 596922 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 596812 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 596093 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595968 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595839 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595714 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595580 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595435 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595311 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595179 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 595054 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594907 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594782 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594668 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594508 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594395 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594266 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594146 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 594013 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593889 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593761 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593401 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593271 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 593111 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592981 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592861 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592731 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592609 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592500 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592397 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592268 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592144 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 592014 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591912 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591788 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591641 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591526 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591389 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591267 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591146 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 591005 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Thread delayed: delay time: 590864 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: hyper-v video
Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp Binary or memory string: vmware
Source: wscript.exe, 00000002.00000002.2258849907.000000000093F000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}j{
Source: SurrogateRef.exe, 00000005.00000002.2483734240.000000001C252000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: SurrogateRef.exe, 00000005.00000002.2483734240.000000001C252000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}^
Source: NewLoaderCracks_1.32.exe, 00000000.00000003.2151665836.0000000002EA0000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Z|
Source: SurrogateRef.exe, 00000005.00000002.2480152172.000000001B2D3000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe API call chain: ExitProcess graph end node
Source: C:\comcontainer\SurrogateRef.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0056866F
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056753D mov eax, dword ptr fs:[00000030h] 0_2_0056753D
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056B710 GetProcessHeap, 0_2_0056B710
Source: C:\comcontainer\SurrogateRef.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055F063 SetUnhandledExceptionFilter, 0_2_0055F063
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055F22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_0055F22B
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0056866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0056866F
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055EF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0055EF05
Source: C:\comcontainer\SurrogateRef.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Process created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" " Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\comcontainer\SurrogateRef.exe "C:\comcontainer\SurrogateRef.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: unknown unknown Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Process created: unknown unknown Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055ED5B cpuid 0_2_0055ED5B
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: GetLocaleInfoW,GetNumberFormatW, 0_2_0055A63C
Source: C:\comcontainer\SurrogateRef.exe Queries volume information: C:\comcontainer\SurrogateRef.exe VolumeInformation Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Queries volume information: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe VolumeInformation Jump to behavior
Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe Queries volume information: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0055D5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle, 0_2_0055D5D4
Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe Code function: 0_2_0054ACF5 GetVersionExW, 0_2_0054ACF5
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\comcontainer\SurrogateRef.exe Registry value created: PromptOnSecureDesktop 0 Jump to behavior
Source: C:\comcontainer\SurrogateRef.exe Registry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUA Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 00000005.00000002.2465802434.0000000002937000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.2486586475.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.2486585028.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SurrogateRef.exe PID: 3472, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6728, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6992, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 00000005.00000002.2465802434.0000000002937000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.2486586475.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.2486585028.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: SurrogateRef.exe PID: 3472, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6728, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6992, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs