Windows Analysis Report
c5uqDb5MlY.exe

Overview

General Information

Sample name: c5uqDb5MlY.exe
renamed because original name is a hash value
Original sample name: 759B333FD8D1EEDB5666FDEA1DA25B25.exe
Analysis ID: 1543419
MD5: 759b333fd8d1eedb5666fdea1da25b25
SHA1: b66fc861196561f793062622b88cdb1065e35459
SHA256: 7a1a3397249836cac73c5f104211fb6cbb2317c830c148a65acb709210aadd2e
Tags: DCRatexeuser-abuse_ch
Infos:

Detection

DCRat
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Creates processes via WMI
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: c5uqDb5MlY.exe Avira: detected
Source: C:\Program Files (x86)\Java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Program Files (x86)\Java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Avira: detection malicious, Label: HEUR/AGEN.1323984
Source: C:\Users\user\AppData\Local\Temp\GwQD1zscMN.bat Avira: detection malicious, Label: BAT/Delbat.C
Source: 0000000A.00000002.1732109470.0000000002D61000.00000004.00000800.00020000.00000000.sdmp Malware Configuration Extractor: DCRat {"SCRT": "{\"U\":\"@\",\"W\":\"$\",\"G\":\"*\",\"R\":\"!\",\"o\":\"~\",\"9\":\"`\",\"Z\":\"(\",\"h\":\"&\",\"y\":\"<\",\"F\":\",\",\"C\":\"#\",\"S\":\"%\",\"Q\":\"_\",\"i\":\".\",\"A\":\"|\",\"b\":\")\",\"j\":\">\",\"J\":\" \",\"N\":\";\",\"I\":\"-\",\"d\":\"^\"}", "PCRT": "{\"x\":\"|\",\"M\":\",\",\"p\":\"`\",\"i\":\"<\",\"=\":\"~\",\"w\":\"-\",\"Q\":\"&\",\"D\":\"*\",\"c\":\"!\",\"S\":\" \",\"X\":\"(\",\"l\":\";\",\"e\":\".\",\"I\":\")\",\"j\":\"#\",\"0\":\"%\",\"y\":\"_\",\"6\":\"$\",\"f\":\"^\",\"b\":\">\"}", "TAG": "", "MUTEX": "DCR_MUTEX-8Csj0yELnc4OH733hQu6", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 2, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
Source: C:\Program Files (x86)\Java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe ReversingLabs: Detection: 78%
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe ReversingLabs: Detection: 78%
Source: c5uqDb5MlY.exe ReversingLabs: Detection: 78%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Program Files (x86)\Java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Joe Sandbox ML: detected
Source: C:\Program Files (x86)\Java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Joe Sandbox ML: detected
Source: c5uqDb5MlY.exe Joe Sandbox ML: detected
Source: c5uqDb5MlY.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: c5uqDb5MlY.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Networking

barindex
Source: Network traffic Suricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.4:49730 -> 5.101.153.48:80
Source: Joe Sandbox View ASN Name: BEGET-ASRU BEGET-ASRU
Source: global traffic HTTP traffic detected: GET /L1nc0In.php?yn6s2=2f1CE969I&2eb64d735c3ceb3cf44155d276f7f3b6=c881cd7e5eb0b68e0a305909638f2735&c145db2fdebeb12e252b4934f8f5f296=gZ1QDN1YTY0EGM5YTMjFjZkRmZwMGOkBzYyImMmNDO4MmYxcjN0ADN&yn6s2=2f1CE969I HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: artema1m.beget.techConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /L1nc0In.php?yn6s2=2f1CE969I&2eb64d735c3ceb3cf44155d276f7f3b6=c881cd7e5eb0b68e0a305909638f2735&c145db2fdebeb12e252b4934f8f5f296=gZ1QDN1YTY0EGM5YTMjFjZkRmZwMGOkBzYyImMmNDO4MmYxcjN0ADN&yn6s2=2f1CE969I HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: artema1m.beget.tech
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /L1nc0In.php?yn6s2=2f1CE969I&2eb64d735c3ceb3cf44155d276f7f3b6=c881cd7e5eb0b68e0a305909638f2735&c145db2fdebeb12e252b4934f8f5f296=gZ1QDN1YTY0EGM5YTMjFjZkRmZwMGOkBzYyImMmNDO4MmYxcjN0ADN&yn6s2=2f1CE969I HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: artema1m.beget.techConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /L1nc0In.php?yn6s2=2f1CE969I&2eb64d735c3ceb3cf44155d276f7f3b6=c881cd7e5eb0b68e0a305909638f2735&c145db2fdebeb12e252b4934f8f5f296=gZ1QDN1YTY0EGM5YTMjFjZkRmZwMGOkBzYyImMmNDO4MmYxcjN0ADN&yn6s2=2f1CE969I HTTP/1.1Accept: */*Content-Type: text/htmlUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: artema1m.beget.tech
Source: global traffic DNS traffic detected: DNS query: artema1m.beget.tech
Source: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1732109470.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://artema1m.beget.tech
Source: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1732109470.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1732109470.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://artema1m.beget.tech/
Source: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1732109470.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp, kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1732109470.0000000002E8A000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://artema1m.beget.tech/L1nc0In.php?yn6s2=2f1CE969I&2eb64d735c3ceb3cf44155d276f7f3b6=c881cd7e5eb0
Source: c5uqDb5MlY.exe, 00000000.00000002.1705861781.0000000003132000.00000004.00000800.00020000.00000000.sdmp, kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1732109470.0000000002E5B000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Code function: 0_2_00007FFD9B883555 0_2_00007FFD9B883555
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 10_2_00007FFD9B8A3555 10_2_00007FFD9B8A3555
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 11_2_00007FFD9B883555 11_2_00007FFD9B883555
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 12_2_00007FFD9B8BA7FD 12_2_00007FFD9B8BA7FD
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 12_2_00007FFD9B8B33BC 12_2_00007FFD9B8B33BC
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 12_2_00007FFD9B8BACA5 12_2_00007FFD9B8BACA5
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 12_2_00007FFD9B8B9E35 12_2_00007FFD9B8B9E35
Source: c5uqDb5MlY.exe Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe.0.dr Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe0.0.dr Static PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: c5uqDb5MlY.exe, 00000000.00000000.1687804026.0000000000C22000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamelibGLESv2.dll4 vs c5uqDb5MlY.exe
Source: c5uqDb5MlY.exe, 00000000.00000002.1708486137.000000001BF85000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCmd.Exe.MUIj% vs c5uqDb5MlY.exe
Source: c5uqDb5MlY.exe, 00000000.00000002.1708486137.000000001BF85000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCmd.Exej% vs c5uqDb5MlY.exe
Source: c5uqDb5MlY.exe Binary or memory string: OriginalFilenamelibGLESv2.dll4 vs c5uqDb5MlY.exe
Source: c5uqDb5MlY.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: c5uqDb5MlY.exe, GTUEegpOky8P0YRB9B8.cs Cryptographic APIs: 'CreateDecryptor'
Source: c5uqDb5MlY.exe, GTUEegpOky8P0YRB9B8.cs Cryptographic APIs: 'CreateDecryptor'
Source: c5uqDb5MlY.exe, S0vmNmvspq89kwKsYl3.cs Cryptographic APIs: 'TransformBlock'
Source: c5uqDb5MlY.exe, S0vmNmvspq89kwKsYl3.cs Cryptographic APIs: 'TransformFinalBlock'
Source: classification engine Classification label: mal100.troj.evad.winEXE@16/12@1/1
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File created: C:\Program Files (x86)\java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\c5uqDb5MlY.exe.log Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2132:120:WilError_03
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\00ae084f6d9c3ecdee2649e9b8f67512372aee08
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File created: C:\Users\user\AppData\Local\Temp\tmp9385A.tmp Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\GwQD1zscMN.bat"
Source: c5uqDb5MlY.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: c5uqDb5MlY.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: c5uqDb5MlY.exe ReversingLabs: Detection: 78%
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File read: C:\Users\user\Desktop\c5uqDb5MlY.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\c5uqDb5MlY.exe "C:\Users\user\Desktop\c5uqDb5MlY.exe"
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrGk" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrG" /sc ONLOGON /tr "'C:\Program Files (x86)\java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrGk" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrGk" /sc MINUTE /mo 10 /tr "'C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrG" /sc ONLOGON /tr "'C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrGk" /sc MINUTE /mo 11 /tr "'C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /rl HIGHEST /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\GwQD1zscMN.bat"
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
Source: unknown Process created: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe
Source: unknown Process created: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe
Source: C:\Windows\System32\cmd.exe Process created: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe "C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe"
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\GwQD1zscMN.bat" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe "C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe" Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: dlnashext.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: wpdshext.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\System32\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Windows\System32\cmd.exe Section loaded: cmdext.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: logoncli.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: ntdsapi.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\System32\w32tm.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: version.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rasapi32.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rasman.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rtutils.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: version.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: version.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 Jump to behavior
Source: c5uqDb5MlY.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: c5uqDb5MlY.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: c5uqDb5MlY.exe, GTUEegpOky8P0YRB9B8.cs .Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
Source: c5uqDb5MlY.exe, ugrXJkdRvdVvES7hcAK.cs .Net Code: KrLHmpNGOB System.AppDomain.Load(byte[])
Source: c5uqDb5MlY.exe, ugrXJkdRvdVvES7hcAK.cs .Net Code: KrLHmpNGOB System.Reflection.Assembly.Load(byte[])
Source: c5uqDb5MlY.exe, ugrXJkdRvdVvES7hcAK.cs .Net Code: KrLHmpNGOB
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Code function: 0_2_00007FFD9B888547 push esi; retf 0_2_00007FFD9B888548
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 10_2_00007FFD9B8A8547 push esi; retf 10_2_00007FFD9B8A8548
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 11_2_00007FFD9B888547 push esi; retf 11_2_00007FFD9B888548
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 11_2_00007FFD9B8800BD pushad ; iretd 11_2_00007FFD9B8800C1
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 12_2_00007FFD9B8B8547 push esi; retf 12_2_00007FFD9B8B8548
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Code function: 12_2_00007FFD9B8B00BD pushad ; iretd 12_2_00007FFD9B8B00C1
Source: c5uqDb5MlY.exe, n0dUDxPHfkwx8EURIFh.cs High entropy of concatenated method names: 'zyg13VvebBLrRKLnZgt', 'nH2JARv4EY5DOnHJE4J', 'xELesavwJcRE0fMuwxi', 'siVVTMv2lQ642LN8hUM', 'gHhtndkiD2', 'Idiw6mvBA3XVSnSAnHe', 'Plogjvv0b0u3NFUSYKB', 'l8qiaov9inXykXptwNZ', 'xtuS5OvgOcQ7FlCk9x7', 'Efna17vdxb3ErXrtBXe'
Source: c5uqDb5MlY.exe, JPyjlax1avayO6djTu3.cs High entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'FnhsU7pfMBZrE85xx7E', 'Opx0dppvh0ZOFqW073g', 'y10irYpkbEob3bacAAl', 'pi7PCapF6h6PKgdIKcr', 'XjCpbppn5OTZJcpYBDr', 'u5EDiKpEFB33ij45t2r'
Source: c5uqDb5MlY.exe, HP4kB9uj5t6WE5JTa4.cs High entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'p5apKx8qvvEKAkkY5hi', 'NcYpBB8oMVBIFxHCwou', 'Wb70E28MN6OaXNbJfwC', 'rFnjCw8jTg4SAN63W19', 'NCqIFI8WVulekXFqkLB', 'FjWVOh8CRCC6l7bO9v0'
Source: c5uqDb5MlY.exe, ba8l2GxHUtFE2C2PcFq.cs High entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'dZGSHuLys9q56dAGwdT', 'htOhJkL55Uqrw6f8hSv', 'rlJpkKLf2jfOhQlWxGd', 'Rg0X83LvbFgRTGaQf6f', 'IwfrY6LkvZJdWKRNaap', 'q4VAiALF0NQH0O4tuC9'
Source: c5uqDb5MlY.exe, rkxr7wHxXRmDl5n65mT.cs High entropy of concatenated method names: 'g7ApUVsIKb', 'sfGpAGFQ0r', 'nd2pVlAWoo', 'Divp4lUGM8', 'NL9HtSGzF8OoGAIpabn', 'FCmnq1GWQxPuWcnyGu5', 'DEWtlCGCTIpkod8FSFH', 'ifXnyPrJu05DK95FvV9', 'oWpIsprN4n2l6koY66H', 'nrgdYlrZvAduGpc9btS'
Source: c5uqDb5MlY.exe, bIurGtHzHfThON9DTJ4.cs High entropy of concatenated method names: 'dm5r8CBQqh', 'fgJrXoX8CG', 'vXFrUmZ0jM', 'jOX8We91idDvPFNAQuA', 'NTv81c9XwuVjYF3IcUu', 'JWwue39DcdCR7cQQpIA', 'RWuhHp9bE67Z1DfLilN', 'wi2Epi9Yi3802jgGS03', 'QP0hwV9hHr3OCplknb0', 'K4NyOn9UNyEVuOy6q3c'
Source: c5uqDb5MlY.exe, GTUEegpOky8P0YRB9B8.cs High entropy of concatenated method names: 'K1rqDnUBG15mcjkUkWF', 'fADCDbU0poWd8wcH9EJ', 'BTIm3CU9iuG5ldt2lLj', 'L0DnNIUgX678iG1lZFL', 'OH1Vmq3gg1', 'yhK9lEUyJUS28OGCJxR', 'xkwKQZU5wiJd8W9S1U9', 'dbGVXOUf3wBBPQZUpQh', 'e63jLCUvjtJUGgpom3f', 'b4AfktUkKWnboHUauXe'
Source: c5uqDb5MlY.exe, HRDr6xx66tVN1gAwYtl.cs High entropy of concatenated method names: 'Qybxkww2ZQ', 'VKeHjcQ9a2xa4BlMY2L', 'AiuPlQQgm3UVOfBZRJK', 'dspTZLQerYATpHZVCBu', 'Q1uHBiQ4GndXD4dJmsV', 'NjZXUfQBCveATGumjXo', 'QLw', 'YZ8', 'cC5', 'G9C'
Source: c5uqDb5MlY.exe, GxdbW5xJ3iyi2XYMvca.cs High entropy of concatenated method names: 'tUidYCxMED', 'eXKd3tU7oY', 'k4Ddnn9Kx9', 'emQRRcipmqfsRUQf2YR', 'jXq4D0iOiB2a4LFWAvp', 'HrFkLxiQwEveWnhZq6c', 'DVvo9FiigsBUwmG0OTh', 'uOhb1ri6gZrFy4I6o2w', 'zhYLNLiR3viV6aSg7P5', 'KxLnw8imIB1q65Fkw0O'
Source: c5uqDb5MlY.exe, WdNQITdJOgXRtbi7JLG.cs High entropy of concatenated method names: 'AqKpim9Yvh', 'Ce27U8G3AcEcObVRkOe', 'H0HHscGtEr4gqBED55F', 'LBgw9VGVixxdZKNom1a', 'hvHDvIGlE0oY8soX8q5', 'peVRVUGxgMnykWHbnAY', 'yZep5bHYtS', 'w2FpERIr7i', 'WZspt5ZrRx', 'SONpjy1ArQ'
Source: c5uqDb5MlY.exe, ibMo1IxX6nIgn3RO3kP.cs High entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'eDILAnOnsfRZAl4d6x8', 'E2KfmlOEpZVPHLg9876', 'P0eHTjOTMqmZ8DXtRMc', 'N1RsLhODtmWwgqdLnWb', 'ULrWr1ObOhjHtPDgS4l', 'DV5YXCO15TjVwGbAvQr'
Source: c5uqDb5MlY.exe, EREkOgvi2JGVteKZqUg.cs High entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
Source: c5uqDb5MlY.exe, KGq75BxkocH3c50JE6Q.cs High entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'y42CSRpVccDYHr20xvI', 'WSZTccp31DR1gej9ENS', 'OFvcenplLDvSutHrtdG', 'AI8Ux3pxGgK9EVjIauS', 'g7wjWfpqe3oxh3c65GM', 'kLd8jwpoW26cheT1hO0'
Source: c5uqDb5MlY.exe, GQSJb0z7hXvxqyhER5.cs High entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'iijSX2LuEB2XJm9cEZU', 'Y6H1WTLc1cFYCX6Vl2a', 'NtYKu8L82iNhEMaFx3E', 'Bo5iugLLTfSFY8P8hYe', 'LwX9UMLK7KvhbDHqhVP', 'pST8BILSvlg23qZglL1'
Source: c5uqDb5MlY.exe, TF5ocs2kSrNmR532Baw.cs High entropy of concatenated method names: 'caFmubdGet', 'Cb1m64vdhc', 'W6XmKf81kg', 'GVkmylkLXx', 'e9Emoma7XK', 'z2nmbg6OBb', 'Ow3mGyKYp3', 'hjOm0ZsQXA', 'kCSmNGhkKh', 'xNUmqWoSfg'
Source: c5uqDb5MlY.exe, looMYlKkM8aBsnVXVH.cs High entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'l4F8mFZWAbedlYmv37r', 'iCshh1ZCCRrnj5x6fSk', 'TljeQjZzV7c3YFFTyB3', 'JqUiReuJrL9q6AuFo2r', 'F45jVMuNHOx99ZU6tfF', 'NbZBobuZZrDcSiTlxPL'
Source: c5uqDb5MlY.exe, wqD7ZwxinJpkIooKZda.cs High entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'Am7Ix2SPR4U2q7apj6m', 'lsNEATStTv93eu9RMCE', 'uklx2USV0jiqiKdu967', 'tpRxcQS3PD5oQaUMSBj', 'IKWCXTSlSGPEGP3HtVe', 'HtZLMQSxXFGjH34Wbxc'
Source: c5uqDb5MlY.exe, aiGkp7VCRe9sEw8UY9.cs High entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'u8QGd3aQp', 'U1g1dpZrP0SV9nsYEYe', 'lAMYLuZIve46lXEPVk7', 'YmqOLQZwEW6jTOBWV9f', 'm6UbuGZ2JnNQmsv5SKy', 'wpHHE7ZeA3ZE80JxSqU'
Source: c5uqDb5MlY.exe, uJurFaLlBxdMM7gMTA.cs High entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'GGEqZTw9F', 'VCScdoZFdaeXnApor8L', 'daBfNbZnhswfi1OqIs4', 'jYfitDZE4EUvfpuT9Z0', 'XB4fq7ZTSHrKXVkXAmn', 'EZJiXLZDSKUB8TuAZq5'
Source: c5uqDb5MlY.exe, qbCy732WPp5WkVRCFN6.cs High entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'Jpvml8SL6w', 'CmsmgvsRb2', 'r8j', 'LS1', '_55S'
Source: c5uqDb5MlY.exe, IlLWugxIAvhARxGJM1J.cs High entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'DaQJhbK03WGxQ8noCrD', 'jKMC8qKd1jbIipkvaDQ', 'N91BhiKsbR3vhkGXuXs', 'UIFghqKyMlIiZv8NxWM', 'MvKhsuK5em1QC9OndU4', 'tVpMVPKfQBiTZ5oefZr'
Source: c5uqDb5MlY.exe, rCBQqh2uvgJoX8CG3XF.cs High entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
Source: c5uqDb5MlY.exe, S0vmNmvspq89kwKsYl3.cs High entropy of concatenated method names: 'C7CiBUIBy4', 'Qxfiws7RXG', 'vbViD4Ss7P', 'xnBieTgQuY', 'WNpiWeVZV8', 'Bo7i1new3K', '_838', 'vVb', 'g24', '_9oL'
Source: c5uqDb5MlY.exe, FhL45iHwINT7xldRbw7.cs High entropy of concatenated method names: 'oYo', '_1Z5', 'LwAJvOQvaB', 'yITr2emIJg', 'vTnJuZK1Ug', 'USPVHB4RwWsIgQESQTH', 'gRZ1F64mx1GBXD4gITy', 'Fo8P9M4HtEOZkMa5D2P', 'yZWPqp4axctRBZhekkE', 'I2qqjA4AvDTgRmuD5Pn'
Source: c5uqDb5MlY.exe, faquVbdmtGu45jf5KcZ.cs High entropy of concatenated method names: 'vvbHaPyjla', 'QwtKJimuuDAxHMjMEXQ', 'db9cJ1mchWAF8u3NGbw', 'HxtjiGmNxqeZffZTQ1s', 'AFwCT6mZaMsRh9cT3XD', 'b2dgJMm8EdL4Wg2PisK', 'PK4O9EmL9CvOcVMtgJr', 'OYscASmKPkK8DJOM5hA', 'SbaErxmScXiiPfapTFw', 'DxuL8KmOXcj6jkjUw1q'
Source: c5uqDb5MlY.exe, Tn6nmwdX8M1y10KFeSM.cs High entropy of concatenated method names: 'RME2u9YFha', 'ljf2JdfFGJ', 'XJN2z3V7ra', 'ogjPsVAA54', 'XadPx7htpw', 'mTCPd6FFA6', 'nE8PHUjvCH', 'EluP21SesJ', 'Md7PPWsDlQ', 'Wm0SZNaopXNgqR6KYfA'
Source: c5uqDb5MlY.exe, V6WRlYv3LFsjEnUlnTf.cs High entropy of concatenated method names: 'IGD', 'CV5', 'EH5fnkB8Wc', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
Source: c5uqDb5MlY.exe, LS5opj2nks4TL88xwoI.cs High entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'MsxOsHpQij', '_3il', 'KUXOxNqrJ9', 'wdIOd4nEyC', '_78N', 'z3K'
Source: c5uqDb5MlY.exe, UwiTXhHmxvHmIFcZkEu.cs High entropy of concatenated method names: 'LAmQqsaJVs', 'mX5QhgLVtV', 'Le6QB8yvwB', 'MWXQwxVUJB', 'mA0ZVnwkmWDQfvHnZWR', 'GLTY5CwFBaw0oB27Xrx', 'PfNLYQwn8JMMxeKu2Ng', 'yFS0yuwfOvYnWkeyhNW', 'NMqHl0wvs9Xs5CArxRj', 'kTXeq9wEKvSJ81YOosC'
Source: c5uqDb5MlY.exe, q2H25Q2jrdJ7FDcNL5b.cs High entropy of concatenated method names: 'uEgILUmp1i', 'AU4I6sWa6W', 'hlYIKLFsjE', 'xUlIynTf5u', 'xSZIoMRCUl', 'EcDwMeBFyaNb102nVEx', 'TaijdMBnDEq3EbHhuta', 'AuHnLrBvqRxPQtFtfqi', 'J58lleBkc0iAT2jW6Dv', 'rmF8CkBEuAHAdyORhpK'
Source: c5uqDb5MlY.exe, YN3V7rdtaggjVAA54ua.cs High entropy of concatenated method names: 'YZF2O4k5wl', 'k6I2mnjLNg', 'Y6UqRCH9jn9at1b49WU', 'uaRxaTHgSbGZropoR4o', 'juToDfHeLVy3IcIxitK', 'A3SXgrH4tseijDH3JWI', 'ry0kO1HBhGTePlLCjdu', 'KvsIvkH0858xe0kZ03w', 'rS07DVHdqQRkYS4am7k', 'wxjVFqHs8i3pbIaOleT'
Source: c5uqDb5MlY.exe, NKcBs1vZv9VXVB42tVE.cs High entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
Source: c5uqDb5MlY.exe, dHbQ7uhjqhMgdmIkDi.cs High entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'KL9cEjc7eG0RmjvYkLf', 'OOWqbMcGGUNDT96iu6J', 'TFOladcrePFb106jlLr', 'jtR5mQcI1rDDHgaFiUH', 'Xaox5scwVKYnUfK1Nod', 'nXpbjIc2NJWdVFfFbXT'
Source: c5uqDb5MlY.exe, ewTRg0xwpLSG75kNSiZ.cs High entropy of concatenated method names: 'lhodFBQYec', 'E6Cdc5kWsd', 'IOfgEkpiuG3PAqFBlvh', 'CgLpXUpQPuYd7QumhlR', 'mPJfJappUgAnPJKVcII', 'Gbg1oZp6ia2UNXIXTpa', 'kqbPP2pRAYc0C2XVhge', 'NiUWpUpmjgKfa4jWvyt', 'EYRV2ipHnlMoXJZLIXl', 'sMgac0paDggT8aBNrHb'
Source: c5uqDb5MlY.exe, gAdxinYKjEBtDP0AFP.cs High entropy of concatenated method names: 'DFunWxmAW', 'rp9ixlsRl', 'RwQfo0iTy', 'hyMZgvecT', 'f3a8nRFxQ', 'nAaXFMQYW', 'PSHUJdneb', 'CEn9RtNSiOTn1omKw6A', 'yHxiuHNO9X8NdcF8Uby', 'rBggubNQFXgbUmoX6Eh'
Source: c5uqDb5MlY.exe, aXomJT2aeMPmO3AQU5H.cs High entropy of concatenated method names: 'tx4liawvel', 'jtXlZyvVnh', 'ckflOde9D7', 'L6IlmMBS1h', 'htDllWYTgX', 'IW3lg1EbOR', 'u7ll9FyV7J', 'oeOlSfOKge', 'zHEl5hVcEm', 'mbQlECgeff'
Source: c5uqDb5MlY.exe, FoeM7axm2JkLBYWqyyR.cs High entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'bmgUO0KDNpcIWhad0qR', 'fewiyHKb2HJRYeej9dC', 'VCRBbpK1G9M8L5pMAFE', 'GZ64DIKXNlqlN10LIHS', 'XA3XbsKYn6R39NLvdLs', 'gGEGnbKhy4rFM0a6bk0'
Source: c5uqDb5MlY.exe, p65dFqd9QtletjEIjZy.cs High entropy of concatenated method names: 'Vu3HuKY4vU', 'slGHJQTwKc', 'TfqLhymrIfYeUxNO2Sa', 'kRGAWJmILtwaHVVDtgd', 'WtTraumwBggejlNZIiR', 'jW4pXAm2UXJkfeiYncd', 'xTuUHZmem9n8vQQXnZ6', 'D3P740m4jsCDrdQajSW', 'wDA5eXm9kKKEZaPSbNo', 'qOUWBUmgmCuCAPyvBWQ'
Source: c5uqDb5MlY.exe, vF0GLQHIXthEUFtbKOV.cs High entropy of concatenated method names: '_223', 'BVuVVYw7wMJjKdfLLcE', 'JwdRTpwGCXdU15hpLPJ', 'KbyHQawrHvvJhD4wAtR', 'KjewulwIFEPOj3OsFIJ', 'LA10HdwwteTny7aYeNJ', 'l07cpqw2uGq9csNby1a', 'EUEwQ1weQlFcjXUPQoU', 'Pamuk9w4DyyvboXIBnO', 'KOwydCw9OJXMXrXO64H'
Source: c5uqDb5MlY.exe, qSkPJwHaqRMnJrvCWNu.cs High entropy of concatenated method names: 'bq3VKR9ET6Ga6CGwtPT', 'AG8NZ79TOQ2GlfVtskL', 'DWidI89FJToNKWd4mYF', 'F621uy9nw1BF3j5GyWr', 'IWF', 'j72', 'uFNr960OnN', 'jq4rS2SiZr', 'j4z', 'BACr5QVR3G'
Source: c5uqDb5MlY.exe, KucUZnvW0Qb2QkxJfl7.cs High entropy of concatenated method names: 'uajUYkJ8ue', '_1kO', '_9v4', '_294', 'dDsU3ygbrW', 'euj', 'DGeUnnUkqV', 'BUsUiBoKbD', 'o87', 'aVvUfPhjsR'
Source: c5uqDb5MlY.exe, rVLUGWaKiyqju1FqbM.cs High entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'Dwr96c8hDN1EY276IOn', 'UjS91M8UnPCHsvFBrsG', 'wrED478PDpNcKuLmfDq', 'GUXCR48tJ3sVZWxOFsW', 'C5RRvG8VsbLDnl6HS9V', 'd2I5kT83URWWwrKmjqJ'
Source: c5uqDb5MlY.exe, qGL9PuxpByCJ2GITuws.cs High entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'PnmvI0LowZiqbvNwXiF', 'vWQLZOLM6f9Rx0Tw7DC', 'FHY2GKLjhd00SYI3xQx', 'H9r9lELWXXuwiCY50tn', 'y1kfaULCwvBof0nUxSf', 'LYJe9GLzqyHbrVQBnZj'
Source: c5uqDb5MlY.exe, zvemMRvd8Od5NSvqoCs.cs High entropy of concatenated method names: 'bZsfQYGqQk', 'pPhfRXwX10', '_8r1', 'IIpfruAh58', 'cg0fFVWRjU', 'Kedfc6UI3V', 'zBqfIelMlh', 'NqiCPDbaMuD7H4Urib0', 'vKusRTbAWFNjyleux8E', 'W3dE3Pb7ohCXS2bab5f'
Source: c5uqDb5MlY.exe, t5VYyI2FsDMCSn7FIit.cs High entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
Source: c5uqDb5MlY.exe, rNQfFN2PWcDqB8L2xyd.cs High entropy of concatenated method names: 'oHBc9TPVcd', 'mEDAZmgGpNJMEmrrAsb', 'BTlIgrgrpJnPRu7mweX', 'bHZKCxgA7YWSpiwbTny', 'JTw1nPg7CnI9VovZolJ', 'Bi7rACwX1Y', 'T2xrV2FujC', 'JMbr4C5aXk', 'zn9rLSDlIV', 'LXFr6rR61Q'
Source: c5uqDb5MlY.exe, V2QI7JvyVMdpCeHO2vY.cs High entropy of concatenated method names: 'M8WXoUGUbg', 'tvjshTYyJuwg5Q5U9MD', 'C9SOhoY5VGnEeLdoKYA', 'nxKUl2YdhB8MPABV29I', 'eDMtcLYsN8IRNBDEuvc', '_1fi', 'n1581gAaZa', '_676', 'IG9', 'mdP'
Source: c5uqDb5MlY.exe, gnffZt2IyiUCMujcTjS.cs High entropy of concatenated method names: 'BOMcK7vtsM', 'hVycyp4FwQ', 'Y15coQroLL', 'jgBcboMccr', 'RVlcG1tgPJ', 'O4bZJkgCV5HoCbFfou8', 'VS2LDagzh66j8ZALP9m', 'q5FtCxgjFkN7blE8gv3', 'cqLdTogWNZIS1SHIjDM', 'Rl8T26BJ3uvnBmdMlLk'
Source: c5uqDb5MlY.exe, ugrXJkdRvdVvES7hcAK.cs High entropy of concatenated method names: 'f4AH4j7OGn', 'wyDHLyhCak', 'hZPH6gKx6y', 'YVmHK9AIZ8', 'QMyHyIeNE8', 'UDOHolExN7', 'ys9HbAfRWg', 'V72RoFR9QQ9K7k5Fa0K', 'e6kjiSReqP1xo7smAHn', 'wJogfcR40yTkeDRxqpI'
Source: c5uqDb5MlY.exe, NTWlXDPMV6aaiSgiDRs.cs High entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'JQWi3CZCtU', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
Source: c5uqDb5MlY.exe, kIgDgRHhGr3KNDN9ltk.cs High entropy of concatenated method names: '_5u9', 'AmjJGSFOO0', 'MpCrsTxEhN', 'wpdJTU6dDx', 'VqL1moejILpLDWJRTJP', 'VaHnA9eWwnyPCEySKTM', 'bp85KXeCNZwxxb7Ocnb', 'fqiTC3eoLQ2sdbiB9Sj', 'yMO1aHeM82wcc3H9Yy6', 'hP35pmezZgVDk1TfIxH'
Source: c5uqDb5MlY.exe, YtXgIaHExuJwH0Q7a2C.cs High entropy of concatenated method names: 'eutRlZvmS2', 'd25RgQrdJ7', 'jDcR9NL5bQ', 'GYp3FJ2Yfyk1xtg1Mib', 'g9nORG21ZQhrvJeXIPO', 'sheTLx2X7uZtwHhYM04', 'EJtypw2h9uecEqIeLlj', 'O3HRv613Rv', 'cNqRpm5xws', 'AfSRQpVPvG'
Source: c5uqDb5MlY.exe, todD67d6OWXfG9KlqFN.cs High entropy of concatenated method names: 'zjoPUdD67O', 'TOj3HMAWd5g8I8LOqVc', 'cVL31lACv4Bq8Kky2Vd', 'QotLWYAMtea2rO86x0C', 'olPmxLAjrYlPGAjXnrj', 'e3LfTMAzL5n3nUBAYpI', 'ioX17r7J1YyaNpTxcON', 'cSy59G7NGlucU0QLUT3', 'VcuIyq7Z3d1vtjJsGUZ', 'gtmJye7usUOjDoSFkk5'
Source: c5uqDb5MlY.exe, gUv7KWHgylxavvYtpcg.cs High entropy of concatenated method names: 'tR6Qe4gv1n', 'NFwQWq2rrY', 'rrjQ15VYyI', 'os1BVSwU8vjLHvqcKZW', 'x6Y4TWwPdtYgUYwvHEj', 'PaTUfgwtPZvY3LLbwCj', 'COOyUxwV2j4jAfROxmt', 'oyvChww3PeZVsvSm87S', 'AbbfoCwlFTHgZLZDwPL', 'gk8yUIwxZIf1L4SXpmg'
Source: c5uqDb5MlY.exe, xUUxcAo0iX4uuP6Rg7.cs High entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'dqTJ5yuntvQnpa62XNm', 'SGqBrLuErTfcwirBJp9', 'H7ToYruT3nLVWLdf57g', 'xcbpmRuDJfKu6vQllYS', 'CfINLQubOMaQARXlyQR', 'bc7n0Ou12vkepDsswe8'
Source: c5uqDb5MlY.exe, AmFwhPP6513AykoJTEZ.cs High entropy of concatenated method names: 'pFXisQAAH3', 'zA2TXeEjmdGx06hdQaP', 'hVPTrFEodwQx6tWkV5l', 'qtgGrvEMRKBEFKcyD3w', 'cMJOPYEWUThGWtGfjum', 'Alh5LSECsORDVoSVRhK', 'Gv8v4LEzdGTvOHpr0kc'
Source: c5uqDb5MlY.exe, kqKoUJxgFuWsDvnivNU.cs High entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'gpKMg0KxWniZ5QgYTBs', 'gbjTZMKqI5K5Lqw64FD', 'prmCfQKobwW50MOnNBd', 'Fmm2QpKMqOD9eUuMhOb', 'sa94dcKjYNV45XrhUMy', 'R3TtFeKWkSaqOso76Tn'
Source: c5uqDb5MlY.exe, M92mItvVyQsJuKGtY7m.cs High entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'MUSZixUr8w', 'xxJZfc2840', 'ICdZZxZIBe', 'pbkZ8xVTXh', 'WaqZXnTPaS', 'OX1ZUNNoHi', 'ROBIT4XEXFGjyMEeSnv'
Source: c5uqDb5MlY.exe, u3nlwFxS258jIdp6dLB.cs High entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'C8WlsQSJmyvdpMrDZSM', 'jkHIq9SNnMvJlkFWAdB', 'EyIZOMSZCxyG5cC89G6', 'UF3EjdSup1rZ4gPTJLT', 'eVPyjfSccLvqDGvFTko', 'iRJIL4S8TiouYEiEnZt'
Source: c5uqDb5MlY.exe, P5v7RbxAh2Sq0uPK7YF.cs High entropy of concatenated method names: 'gFnxBihKqA', 'MlkprrQZFQESSpywasc', 'DGR0IKQus7qeCRyprKd', 'LBokNmQJqBOFEnTE7eL', 'Fi9yroQNwfrHtHuk0lX', 'SPgNCMQc2sh67EK9Q8I', 'CgmoFRQ8PRsKsjUW0kc', 'O67fnAQLQQAcY3XM3a9', 'Ku2xDYFw9S', 'Mpmjn0QOUtp5bdZ8BII'
Source: c5uqDb5MlY.exe, ztsSfvxaxSJXR829u0A.cs High entropy of concatenated method names: 'yI4dEt5GL9', 'ocTvH9iLZmLcvH5eDrJ', 'nAX9oJiKgE6HQkuWoYr', 'QrfbTDicna9cWs5BZFt', 'TRJBZMi8IufWxFX41pD', 'HDuySoiS5Lx5JrwHmwC', '_5q7', 'YZ8', '_6kf', 'G9C'
Source: c5uqDb5MlY.exe, ICqkkPHrECjKOkn2nuj.cs High entropy of concatenated method names: 'TK5QLwjCp1', 'fXHQ6jlWP9', 'ebqQKg44l7', 'xq6ANAwmFSMWDayv3EV', 'loyhrqw6GisBxZM4JdC', 'eIbL2hwRJKQxPDvSKhT', 'r43nTJwH56hOf6pkuF9', 'PLvQlX6uPB', 'hKOQgKqsmt', 'd3MQ97oX80'
Source: c5uqDb5MlY.exe, IbfcmaPZIaVm990IBUF.cs High entropy of concatenated method names: 'VhPnbJN6Zv', 'CQhnGFJjip', 'rc0n0OjGOT', 't3GnNScbSY', 'ngcnqyMcqs', 'ywecfVEd8oWEBEOFtE9', 'TPG7tSEBKBQkc2SdCKc', 'H6okGEE0rS4ccIsotkK', 'SvTTSHEs7Hwhm7iL3LZ', 'gfM3r6EyD4phIhlIKbK'
Source: c5uqDb5MlY.exe, gTOQYlHeospYMB75fNH.cs High entropy of concatenated method names: '_9YY', '_57I', 'w51', 'e43J4XyOQE', '_168', 'oGBDj24gQrCROPoKbB1', 'QUKy8v4BS8UywfwMZXD', 'c4rTkU40fpR7AabLD8y', 'xW7ggm4dVtFX3USZlN0', 'TLCnvk4sLbRo2qUqT7j'
Source: c5uqDb5MlY.exe, U5lpdLvCqYoclPhGk3R.cs High entropy of concatenated method names: 'hTwftCrRde', 'N0mfjqdXLZ', 'RVkfCwexL4', 'Q8YfYp2YTO', 'kj2f36HAdx', 'jFQhm9bjDMX3RRlNceS', 'VAaycmbW3PhIZp9tRkb', 'TbRGaRbCIOuI1IKoB2E', 'jJELh0bzJIBW18xO9TQ', 'IoRjHO1JU7hOeSdEDuP'
Source: c5uqDb5MlY.exe, bJfiUXd50tJ5YPSXhMq.cs High entropy of concatenated method names: 'WriHzvGGq7', 'rBo2scH3c5', 'LJE2x6QBoS', 'Ivf2dlBPar', 'O4J2HoobZt', 'aSf22vxSJX', 'h822P9u0An', 'zNW2vPLrd9', 'Mw02pXZnfx', 'aEE2Q1ylLd'
Source: c5uqDb5MlY.exe, Iq6NoNpiLuktQsjFCHs.cs High entropy of concatenated method names: 'DHwVnlY4PI', 'ipaVi3tdGK', 'MjiVfQkplS', 'dOJVZbOEem', 'exhV8fOdEf', 'DLbVXVH0wh', 's2BVURYveK', 'JFqVA0j981', 'kaSVVwTGOe', 'kJyV4pZ1Fy'
Source: c5uqDb5MlY.exe, Ek5wlcds6InjLNguC1b.cs High entropy of concatenated method names: 'Q7ediquyYs', 'PNAdfDObWM', 'J1RdZa14BZ', 'd2igihivDNC7GNjvtgj', 'TGYsFsikioGtnd3vD2Z', 'J7aet9iFrVHmm8pM8qG', 'tQP1nvingAha0rkbaxL', 'd6bHX7iEgKIrAr7uDkY', 'kAfeQciTaAvMlcCpKPM', 'Ky9rfRi5NJdxbfMGCHv'
Source: c5uqDb5MlY.exe, DWcWGu12YFw9SxHHOL.cs High entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'FEHoDa8H4jX19jbWwCN', 'tZvY9i8adXZAY6EYuuS', 'Dml9vC8A7DbUgLYv0O5', 'apEHXW878q4mgFOy7RK', 'UDVonf8GqRR5pZ5Q2dT', 'dasvck8rmImrrQGI84l'
Source: c5uqDb5MlY.exe, T5QroLPJLFgBoMccrWV.cs High entropy of concatenated method names: 'EGai8m11F8', 'z11iXOqyuf', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'OHgiUY1acq', '_5f9', 'A6Y'
Source: c5uqDb5MlY.exe, ogs7NiNfWKVQDPdmNn.cs High entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'KgywtKcpgsDNskKtF8k', 'rM0MnMciItgNHMUCYtb', 'fEWedvc6iCykX7mQL2y', 'AVGyQEcRbuIUwuK6yqn', 'CkISvScm4lLA7hJf5TL', 'b0Y645cHgfTPFCuH90V'
Source: c5uqDb5MlY.exe, Wj7pbIxPGKCoJX0LUjQ.cs High entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'U6FEiILUV0FUuB5XoTX', 'usaqt8LPdGGnpNjBDWi', 'IRpDIfLtC7tMCSSHdv5', 'cnZasoLVUAJRZTB8Sn4', 'gn6wvNL3eLwQp9Hx0RE', 'Ai5hmQLlnb85reLGfoK'
Source: c5uqDb5MlY.exe, WPLg4cHNKL5kGY0A3xc.cs High entropy of concatenated method names: 'sg9', 'dl4JsL7wbZ', 'mfpRu5jnkZ', 'u6XJgSXXds', 'F7sQlRetWk3EZnOklmI', 'qVAWFteVoi90gvcc5b6', 'jhRelie3lusIqEMPqCO', 'Fw1sC6eUTVsDcX7YXPo', 'rJseXmePpAkSAbRnlOH', 'MpQ9Dselj1a8L3FFNoX'
Source: c5uqDb5MlY.exe, pTqghXddI9TaAY8AN8K.cs High entropy of concatenated method names: 'OVRdDTkAYL', 'IipdeoBY9d', 'kICdWPmuGp', 'wZbd1JMcYy', 'nLXd7QuPqp', 'POsdkcdWHl', 'tfVKP867fLtxjBxdxY6', 'warK9K6GEI7FUSdUwiM', 'z4tpG76aNqbM1XcgP7A', 'L8Ldl46AaFwNc6EHInK'
Source: c5uqDb5MlY.exe, Hfc621vhiX487JTJpsN.cs High entropy of concatenated method names: 'PJ1', 'jo3', 'lrMURAWF5v', 'xRrUrAey8M', 'e7NUFiVsQf', 'EC9', '_74a', '_8pl', '_27D', '_524'
Source: c5uqDb5MlY.exe, uwylmnkcf5Beybww2Z.cs High entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'QI7EHk8dP06APvTklrk', 'XITsAa8sP6LLK0nccCs', 'Fvy6Ab8y1QuejR5YWlx', 'cp5pwc85FBHKUNyiYEH', 'erOZ6F8fkienEhf4AMu', 'KQOSRg8v86DkFbWMuo7'
Source: c5uqDb5MlY.exe, eIwwWYxxH4PkB9WO6Qc.cs High entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'biTySQLroGM0JkEET6w', 'V1d3n6LIQXlCt6b2qN9', 'fLNn80Lwn0hVTg0gL3O', 'tepNFQL2w47ENyNtUGX', 'gyvyONLetupGm1ihcYM', 'OvD8YyL4a5D5OnR6BOl'
Source: c5uqDb5MlY.exe, KVsk7tPb4iFYMr8jusB.cs High entropy of concatenated method names: 'FdgnemT8ZWbK0Jm9Bm8', 'kjKUEhTLRBrjdpTxJas', 'VFsPelTuG6wYQDZMrBA', 'ILt09FTcUo7si3KN7h0', 'Vx09HKTK2Bmog8Mlbuk', 'hPvYvJTSyoy4b1giVED', 'KJ3P4PTOWRSCAeuoIEc'
Source: c5uqDb5MlY.exe, zPgKx6x0yJVm9AIZ8DM.cs High entropy of concatenated method names: 't5tdx6WE5J', 'Va4ddkbd8f', 'CxCdHVoTLB', 'YWSaEZQlOrV2NEEhARO', 'O3A5SaQxk1pfsf6gG7v', 'SHari2QVEN5CFucsTY8', 'AWdFJEQ3qOcYXnDxQ3g', 'HsWKWHQqMfBBp15aYJG', 'kQO3jcQofBufjTlcGgP', 'DxBZHVQMBLLD260gO1x'
Source: c5uqDb5MlY.exe, rDPXKtxRU7oYc4Dn9Kx.cs High entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'HJrOrbKKrBrNiPTC3tt', 'x4R6dxKS79uXTCGKBRn', 'n8YQWhKOMfKCwoTUNPk', 'FbpUxaKQwkC0NVC5wNn', 'h5fxSFKp5xwkLucTo0W', 'FlNGC1KiuCstIhTIsQJ'
Source: c5uqDb5MlY.exe, R8y8oGH2VSEXKhDL5Kn.cs High entropy of concatenated method names: 'yYkpN0fr2U', 'RikpqkTid2', 'q0jphqofxC', 'IGnpBcg9Uu', 'n57pwqZfeg', 'GSBpDRsMx8', 'gKpn91rsHgUjlckk5Pp', 'Rnn2akr0JRbGSfGvhsQ', 'F2NMSFrdbWWOH2oHCqn', 'HF2nMsryqXx0RO2JHhx'
Source: c5uqDb5MlY.exe, BhW1wcPTYPaXeoRwj9P.cs High entropy of concatenated method names: 'EIgi2CjC0E', 'YomiPh21q9', 'HwiivYMasp', 'HJqipjDwlN', 'iVIiQrbFvb', 'jLmiR4b2Ax', 'J26irKBaIR', 'n1LiFEHlp3', 'LqTicwdPoE', 'ExgiI3C5Oq'
Source: c5uqDb5MlY.exe, OuDSJdHn7OVPZ3pVYTl.cs High entropy of concatenated method names: 'sMqR4BeJBm', 'TStRL0adfM', 'oI8KuheGAplkAxTamRv', 'zyII3rerMwxm97BFKKw', 'MbIopreAfG5FU1EiIvn', 'zEigrEe7MXICO0wqYit', 'RSBRwaeIr7go3JXuk4d', 'p27ZbUewQbhXDRjDXqO'
Source: c5uqDb5MlY.exe, cHld9xxhojCrCDkZjJr.cs High entropy of concatenated method names: '_2WU', 'YZ8', '_743', 'G9C', 'vEYjB6pLscm8UNy3pfQ', 'z1Vm4QpKFO1bWA0x9It', 'f5wjlFpSDdOS81K5pNr', 'b6u1ULpO6eoNgBRgSRJ', 'wGBXDWpcFXv3UeHycUI', 'ypxP50p89kjimNo2mYm'
Source: c5uqDb5MlY.exe, g3P0K82ZeEkBE4eOACU.cs High entropy of concatenated method names: 'PcFOLtm4QT', 'NLpO68oIKY', 'P9nOKnVUbP', 'M8xOy1Y2PY', 'WH3OoKl0FD', 'z7nK940r7TVMxxWHnGW', 'Cnk65X07ELDe9RUj2bu', 'QugZyP0GQ0mkr7i7eZI', 'p15ULa0IftxvB1WWKKW', 'KWd9kQ0wxU8hmTUl6bF'
Source: c5uqDb5MlY.exe, p7NiKIvvOqAVJsFXPEJ.cs High entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
Source: c5uqDb5MlY.exe, nUs4YFpjICMOkNMASI.cs High entropy of concatenated method names: 'a4YOFjICM', 'Ka1NIdvpNJENM0VZjv', 'PC4dh25EGkD9pBGE3A', 'TetSTef66PZlrdyhDP', 'g6aZlakL89DdEFoyQ1', 'D4GTLKFx3BFAbjVRXT', 'jJBdDtEWL', 'IIpHk8cEX', 'Okg2nXlbq', 'YpmPGp2O8'
Source: c5uqDb5MlY.exe, GWltY2dGI7ng06e1YbY.cs High entropy of concatenated method names: 'VacvQk1NI3', 'FvevROCiJ5', 'neKE5P7ogRqVm19exrU', 'VWrhsd7MnB5mKIi1gAi', 'rTdXC27xvyoE2wtuMMa', 'ypXY977qO8aCxMEG6kl', 'bNQv9ITOgX', 'ELPOCqGJR3eT3KpOQmw', 'ik4Zl7GNnxS1dPKfgth', 'o3w6aQ7CNhmvK3fglnf'
Source: c5uqDb5MlY.exe, aDlQaxdYDkoEWawFASt.cs High entropy of concatenated method names: 'loD2jD8Qwq', 'zmk2CHsMSg', 'q292Y2Zmkf', 'LjI23Xk01G', 'O7S2nVDve6', 'UjwLW7aJp6swKbarL2N', 'FSAtYTaNy8xdtEp3XeJ', 'IJXBUsHCbqFJBcMsPZF', 'oHxILlHzaviLpNUchuJ', 'wjyeqnaZfkgodp57W8R'
Source: c5uqDb5MlY.exe, f5UZ4KHCGfsnDXcGS9O.cs High entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'i2ip8xeR4hqL1UWfeMI', 'iIkpMwemoYbB5H8LcCu', 'HncMWPeHgbBWw1G3aaZ', 'O2BMMMea1mKY7nytRE9'
Source: c5uqDb5MlY.exe, WdGsGj25STPJQHrKuMW.cs High entropy of concatenated method names: '_7zt', 'FkfIEJKJUU', 'xjbItV2yPP', 'Ub6IjLG4ZI', 'u6IICfMuq6', 'EPEIYm6Oio', 'eSKI3bna0G', 'tf6XQcBeblponuyHPcs', 'S0bpG2B4hyO6jiE3KlU', 'wvHFBEBwOSCm05CHJ5m'
Source: c5uqDb5MlY.exe, MsxHpQvLijGUXNqrJ93.cs High entropy of concatenated method names: 'kolwfyYcHIfZqpClArf', 'vwCk6hY8lr0CG6H7Nj0', 'tgiMvPYZD8FLM9e09AE', 'yhafEIYuLObi0oEoNj5', 'hHgZ67Dfow', 'WM4', '_499', 'c1oZKXQjCX', 'vLyZyaLyaj', 'zbXZo67lYu'
Source: c5uqDb5MlY.exe, goBY9dxEcICPmuGp3Zb.cs High entropy of concatenated method names: 'MifxUWKVQD', 'h9yOJsS7k2wepaTWKYv', 'pUpLbHSGsK4xxI6Q2DM', 'SvluFASaSKgqeAKfvx4', 'DkSLZWSAle0TmsCih27', 'uZgqnTSr6pD1paxo34O', 'UpkOioSIy5hNLTG5Wes', 'QgcpMTSwQlWjRTnPPV4', 'VIrvKtS2Zw5fuQ6W9b5', 'f28'
Source: c5uqDb5MlY.exe, q7SpfNebkQTXAiuPHr.cs High entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'IpPx7U8LWouDDTITUrB', 'JyOeYi8K2alWC3wWxNw', 'KnS5lP8SgO1XlVuE4V2', 'kj5nxZ8O0wh4eHQmI3F', 'H04tg58Q2nEVGGWcx8G', 'NlJvQY8pfZRvHZys3OF'
Source: c5uqDb5MlY.exe, N2Sj44fC4WrDuMp4ET.cs High entropy of concatenated method names: 'SnA6cEjUP', 'TAOK3LeAQ', 'ocQyqrS26', 'PheOadNTbavGtO0EgZN', 'bQR1KyNn0lIByZvdBWw', 'mNt5hwNEXsoWfymkGZn', 'Rg8jVjNDsjG6d9KbMLc', 'CRe2N2NbkpoW5kUeCDd', 'th9ggcN1vaMoUbe0q2D', 'biiLjMNXr3pI7G3GaWP'
Source: c5uqDb5MlY.exe, PP08FIxZVQVA6LFUNF1.cs High entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'y3JxoJSCPWcP2lS52yF', 'NAPGqSSzEf891qKDAsx', 'qqj2lqOJbdEhsFKE96U', 'Sqr8K5ONMR8jCEWomnj', 'R98JuUOZPRixlbjYE4h', 'YSF42hOupr1uZC90yP8'
Source: c5uqDb5MlY.exe, nvPeU6GTWGnkU2hvmC.cs High entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'Ay6POiuM3BXlFqpsYB4', 'eEam6mujFgfUmvBtXkZ', 'u5WMJguWypg4nX41Vhi', 'N5o14XuCe7gVr26PvYM', 'Q0UvP7uzyYuPnHJPcq5', 'A3vUj4cJFuQ2imeTio9'
Source: c5uqDb5MlY.exe, ROaGe4xoINpi9dnHpfo.cs High entropy of concatenated method names: 'Hqjxuu1Fqb', 'kvvYWqQEAkJW8ZF1P9p', 'yUQNv9QTM556uG9v8MC', 'fRaWvGQFr9TENFbmGhX', 'yKp09EQnk8Ib7AV9QGs', 'OLoTdjQD5xIMMKeip0W', '_3Xh', 'YZ8', '_123', 'G9C'
Source: c5uqDb5MlY.exe, yjow4n85wpI8BExtUl.cs High entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'WIkXHHZpHigo6QQSkwW', 'a4Tb8AZiIfBZw9nXVYT', 'cqKNR5Z6nlrDZ4qhIRp', 'f920HDZRyaibD13fheD', 'eVTbSLZmJWc55LXlxmj', 'IJ9cNLZH5mIuRmsLIj9'
Source: c5uqDb5MlY.exe, sCO7KJPA8jFP8oOpDhc.cs High entropy of concatenated method names: 'OL3nDlkOWR', 'Rjcnenrr3U', 'q8QnWKuwap', 'tVVtPHEbvjPJ1HmgJLR', 'kaMB3kETgkZJfOw1b89', 'CuJNJHED8asPFV7ARsQ', 'gBbBypE1i1N7nt62xHl', 'k3TwPwEXtdwVCG9Bhir', 'kh0K81EYcmyroVLNHTH', 'Ss6GUuEhC9u4kW9FVhr'
Source: c5uqDb5MlY.exe, IHiFKBP7FH9vLP0QXub.cs High entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
Source: c5uqDb5MlY.exe, fQ7OC0wR7AIdcARaoL.cs High entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'rVA7GmcYu3mqnIXefRQ', 'zt1v3ZchJv13H2DO8CP', 'TQxlsncUUOgAZdCF8eH', 'N5BBjmcPh9kqcPavCtB', 'FHoATHctJq3EU4SYY5X', 'Mk6KV2cVA3R96DlbU4s'
Source: c5uqDb5MlY.exe, xpdsY7xC2Ix5BFPnQpU.cs High entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'qaLymGS9SkJAJCO8K5N', 'fuEttwSg7FaN92Mr8GR', 'Vqp58ASBDfVbeXxXI11', 'nyDdGdS0NQdetA99aUy', 'NdvNQCSd8bOqsFkEwWG', 'UPaFmpSsmb2a8FAXq5U'
Source: c5uqDb5MlY.exe, aGywn1pFskcgJXbpv8S.cs High entropy of concatenated method names: 'xAY3FSxx9yDie', 'Gj3QJ6UHRW3Le01ORq0', 'RwkBboUajY409IlGToP', 'ETNUFmUARjp05FTA7wK', 'ICNswlU78faUiKJ22LT', 'O5PjSMUGAwcwLUqFDFW', 'wC8OYWURabQgu7HYtNP', 'doZrwPUmlubn7KpJ4MD', 'tZ2DCjUrkeoMW7udRrw', 'z11KDAUIQvlXNSlAP70'
Source: c5uqDb5MlY.exe, MWXxVU2RJBOKFJpZ4dj.cs High entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
Source: c5uqDb5MlY.exe, KikfCWvXJVMC9m1cPqT.cs High entropy of concatenated method names: 'k0sZR2XSyg', 'w2IZrOck0Q', 'dklZF6GBEw', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'zXaZc3rKxn'
Source: c5uqDb5MlY.exe, PxS59fdocH26nGQdytI.cs High entropy of concatenated method names: '_0023Nn', 'Dispose', 't8BP6uugdU', 'Kl1PKFwxS5', 'pfcPyH26nG', 'hdyPotIvq8', 'uM4PbCuY50', 'r05EJG7OwXp3bDnvrqg', 'QOe7mO7Q646RlGI9ekJ', 'V7ue3f7KrvpJy9udHEI'
Source: c5uqDb5MlY.exe, wy2CqjP4AWEt4risLQp.cs High entropy of concatenated method names: 'y7mn7dQB5v', 'C3ZnkL0tta', 'FrunTmrkNa', 'onsnal2dOi', 'shhnMcY9Ns', 'Y8fnu5CgSr', 'thvJ7dEtAYeMNVvN3Uf', 'ITWYcMEUrYjLTVffgyo', 'f6PhJcEPRAR2XmjlHKh', 'PVO09AEVEeXIA8XQwdj'
Source: c5uqDb5MlY.exe, pPPBJAx3htqEsHuBNTS.cs High entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'kTZrLtSF5dEke4WgVPr', 'FA2MXESnJDdTeRkF2o2', 'MNNh3YSEB5hAgFIPSGZ', 'IvGEYaSTqoCZfX4m8VP', 'syqK1BSDtxlMjd3bwWS', 'eaUSdSSbQOZegSX834q'
Source: c5uqDb5MlY.exe, O8WOnkH11QsAl2OFx2w.cs High entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'QfGrFbm2da', 'dx8JKvMiWc', 'CddrcRXDCs', 'FhgJBjOIMu', 'cQkGWW4TA4KPITTnFV5', 'G3LYmS4DAxO7uYcT7W8', 'AeTXZx4n8MYDXPpAm8W'
Source: c5uqDb5MlY.exe, rmUhVvxe6VhaYqOnCGg.cs High entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'm9HwaNpwDrfwOdOgcF8', 'ToUkhxp22DQIpgdhXJw', 'fhJ995peCNuR5UaKyrn', 'bBep26p4TRFacO1sA3G', 'gEdXZLp9wQS9uqcnRbW', 'V4l1Hfpg192XVt5jGFe'
Source: c5uqDb5MlY.exe, X9jutBHStqOKKZUE0OG.cs High entropy of concatenated method names: 'aDMQ7CSn7F', 'litQkmrxAb', 'qWqQTiZNXB', 'zHWQaFpnff', 'ztyQMiUCMu', 'kEloFI2LiieTQS8eGjg', 'lqDcqc2KZottauBfLwa', 'ziZBUS2cAWfO85euVNt', 'eOygoc28IZPEIL6kflH', 'epcyTU2Sy7ELoCNL5T8'
Source: c5uqDb5MlY.exe, XuI4SFPRhGK5EfxecjB.cs High entropy of concatenated method names: 'rXrntQfcMP', 'IW8njvK6MR', 'tyEZT1nqvhXa1UPToUL', 'QWT5vqnoRZc37gsJ7Cv', 'RkALZmnM63veC5e1fGD', 'StyCaunj77yFa2nIL2G', 'pg2qVanWw1NFOtSo1ug', 'tciHavnClfaAE0aQMlv', 'WkQfT5nzVbIkgbLscAy', 'HK4dOUEJAyNq0T50blM'

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe WMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File created: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Jump to dropped file
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File created: C:\Program Files (x86)\Java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "kiLVdQuGOoDsAqfKidbVwSiALpZrGk" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\fonts\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe'" /f
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Memory allocated: 1340000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Memory allocated: 1AF80000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Memory allocated: 12F0000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Memory allocated: 1AD60000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Memory allocated: 1280000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Memory allocated: 1AD10000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Memory allocated: 2B60000 memory reserve | memory write watch Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Memory allocated: 1ABB0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 599875 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 599766 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Window / User API: threadDelayed 1838 Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Window / User API: threadDelayed 353 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Window / User API: threadDelayed 367 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Window / User API: threadDelayed 436 Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe TID: 1780 Thread sleep count: 1838 > 30 Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe TID: 2124 Thread sleep count: 353 > 30 Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe TID: 5756 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 1720 Thread sleep count: 367 > 30 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 5288 Thread sleep count: 436 > 30 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 2668 Thread sleep time: -1844674407370954s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 2668 Thread sleep time: -600000s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 2668 Thread sleep time: -599875s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 2668 Thread sleep time: -599766s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 4948 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 5856 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 2872 Thread sleep count: 270 > 30 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 2056 Thread sleep count: 165 > 30 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 4312 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 6640 Thread sleep count: 265 > 30 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 4820 Thread sleep count: 331 > 30 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe TID: 5016 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 600000 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 599875 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 599766 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: w32tm.exe, 00000009.00000002.1755823986.000001BF7E89A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllY
Source: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe, 0000000A.00000002.1733451978.000000001BE30000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process token adjusted: Debug Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process token adjusted: Debug Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process token adjusted: Debug Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\GwQD1zscMN.bat" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe "C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe" Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Queries volume information: C:\Users\user\Desktop\c5uqDb5MlY.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Queries volume information: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe VolumeInformation Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Queries volume information: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe VolumeInformation Jump to behavior
Source: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe Queries volume information: C:\Recovery\kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\c5uqDb5MlY.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 0000000B.00000002.1793189374.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.1835354064.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1705861781.000000000310E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.1732109470.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.1793189374.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.1835354064.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1705861781.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: c5uqDb5MlY.exe PID: 4820, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe PID: 6228, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe PID: 2916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe PID: 5592, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 0000000B.00000002.1793189374.0000000002D56000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.1835354064.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1705861781.000000000310E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.1732109470.0000000002D61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.1793189374.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.1835354064.0000000002BB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.1705861781.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: c5uqDb5MlY.exe PID: 4820, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe PID: 6228, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe PID: 2916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: kiLVdQuGOoDsAqfKidbVwSiALpZrG.exe PID: 5592, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs