Windows Analysis Report
poMkNYHDU3.exe

Overview

General Information

Sample name: poMkNYHDU3.exe
renamed because original name is a hash value
Original sample name: f0669646dcc88adb7268293dcb13dc9e.exe
Analysis ID: 1467961
MD5: f0669646dcc88adb7268293dcb13dc9e
SHA1: 8bb62b7ea90e01634e71b2824ca32de8f052d404
SHA256: 1e4b1ea0fe7c16253169b76c22265b085df9bcca509eb39b8597b54bf53a4920
Tags: exe
Infos:

Detection

Remcos
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Remcos RAT
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops large PE files
Injects a PE file into a foreign processes
Installs a global keyboard hook
Self deletion via cmd or bat file
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
Remcos, RemcosRAT Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos

AV Detection

barindex
Source: poMkNYHDU3.exe Avira: detected
Source: 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Remcos {"Host:Port:Password": "servicio.mensajeriafrex.info:5506:1", "Assigned name": "PRUEBA HOTMA DICIEMBRE 06", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable"}
Source: poMkNYHDU3.exe ReversingLabs: Detection: 91%
Source: poMkNYHDU3.exe Virustotal: Detection: 56% Perma Link
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548983970.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7752, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7780, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 8068, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 4544, type: MEMORYSTR
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00430185 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext, 15_2_00430185
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: -----BEGIN PUBLIC KEY----- memstr_b2cd1258-f
Source: poMkNYHDU3.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.4:56195 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.4:56201 version: TLS 1.2
Source: poMkNYHDU3.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\jop tisaj\vepine\hejeboci bacalino tami.pdb source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040A1C4 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 15_2_0040A1C4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040620E FindFirstFileW,FindNextFileW, 15_2_0040620E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004162EF FindFirstFileW,FindNextFileW,FindNextFileW, 15_2_004162EF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040A3CB FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 15_2_0040A3CB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004187B1 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 15_2_004187B1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00407AC0 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_00407AC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00407ED2 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_00407ED2
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00406EEF __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 15_2_00406EEF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00406571 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,GetFileAttributesW,DeleteFileW,Sleep,StrToIntA,CreateDirectoryW, 15_2_00406571

Networking

barindex
Source: Malware configuration extractor URLs: servicio.mensajeriafrex.info
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: global traffic TCP traffic: 192.168.2.4:56196 -> 181.49.85.74:5506
Source: Joe Sandbox View IP Address: 104.192.141.1 104.192.141.1
Source: Joe Sandbox View IP Address: 104.192.141.1 104.192.141.1
Source: Joe Sandbox View IP Address: 181.49.85.74 181.49.85.74
Source: Joe Sandbox View ASN Name: TelmexColombiaSACO TelmexColombiaSACO
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: GET /alfolod79597/advancedapi32/downloads/library.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36Host: bitbucket.org
Source: global traffic HTTP traffic detected: GET /alfolod79597/advancedapi32/downloads/library.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36Host: bitbucket.org
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00413736 Sleep,URLDownloadToFileW, 15_2_00413736
Source: global traffic HTTP traffic detected: GET /alfolod79597/advancedapi32/downloads/library.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36Host: bitbucket.org
Source: global traffic HTTP traffic detected: GET /alfolod79597/advancedapi32/downloads/library.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36Host: bitbucket.org
Source: global traffic DNS traffic detected: DNS query: q1hz23sgcgrjxgo3okrkbbknn.wvkgid5wjj6hnhww93cqraz0uwbqgpq
Source: global traffic DNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa
Source: global traffic DNS traffic detected: DNS query: bitbucket.org
Source: global traffic DNS traffic detected: DNS query: servicio.mensajeriafrex.info
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: envoyx-usage-quota-remaining: 998595.166vary: authorization, cookie, user-context, Accept-Language, Origin, Accept-Encodingx-usage-request-cost: 1428.77Cache-Control: max-age=900Content-Type: text/html; charset=utf-8x-b3-traceid: 4ff22d3cf6a18931x-usage-output-ops: 0x-used-mesh: Falsex-dc-location: Micros-3content-security-policy: base-uri 'self'; default-src 'self' 'unsafe-inline' 'unsafe-eval' data: blob: *; connect-src bitbucket.org *.bitbucket.org bb-inf.net *.bb-inf.net id.atlassian.com api.atlassian.com api.stg.atlassian.com wss://bitbucketci-ws-service.services.atlassian.com/ wss://bitbucketci-ws-service.stg.services.atlassian.com/ wss://bitbucketci-ws-service.dev.services.atlassian.com/ analytics.atlassian.com atlassian-cookies--categories.us-east-1.prod.public.atl-paas.net as.atlassian.com api-private.stg.atlassian.com api-private.atlassian.com atl-global.atlassian.com cofs.staging.public.atl-paas.net cofs.prod.public.atl-paas.net fd-assets.prod.atl-paas.net flight-deck-assets-bifrost.prod-east.frontend.public.atl-paas.net intake.opbeat.com api.media.atlassian.com api.segment.io xid.statuspage.io xid.atlassian.com xid.sourcetreeapp.com bam.nr-data.net bam-cell.nr-data.net www.google-analytics.com sentry.io *.ingest.sentry.io events.launchdarkly.com app.launchdarkly.com fd-config.us-east-1.prod.public.atl-paas.net fd-config-bifrost.prod-east.frontend.public.atl-paas.net micros--prod-west--bitbucketci-file-service--files.s3.us-west-1.amazonaws.com micros--stg-west--bitbucketci-file-service--files.s3.us-west-1.amazonaws.com micros--ddev-west--bitbucketci-file-service--files.s3.ap-southeast-2.amazonaws.com bqlf8qjztdtr.statuspage.io https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/; style-src 'self' 'unsafe-inline' https://aui-cdn.atlassian.com/ https://cdn.cookielaw.org/ https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/; script-src 'unsafe-eval' 'strict-dynamic' 'unsafe-inline' 'self' http: https: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net https://remote-app-switcher.prod-east.frontend.public.atl-paas.net https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/ 'nonce-tQGmjtf9v7mQz+e5pgUKuQ=='; frame-ancestors 'self' start.atlassian.com start.stg.atlassian.com atlaskit.atlassian.com bitbucket.org; object-src 'none'; report-uri https://web-security-reports.services.atlassian.com/csp-report/bb-websiteStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadDate: Fri, 05 Jul 2024 05:13:13 GMTx-usage-user-time: 0.039323x-usage-system-time: 0.003540x-served-by: 1c85bb351e69x-envoy-upstream-service-time: 97content-language: enx-view-name: bitbucket.apps.downloads.views.download_filex-b3-spanid: 4ff22d3cf6a18931Accept-Ranges: bytesetag: "e53208a27c173fc281bbfcc5f7714bd4"x-static-version: c26cc8291d0ax-render-time: 0.08471322059631348Connection: closex-usa
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not Foundserver: envoyx-usage-quota-remaining: 998724.054vary: authorization, cookie, user-context, Accept-Language, Origin, Accept-Encodingx-usage-request-cost: 1296.87Cache-Control: max-age=900Content-Type: text/html; charset=utf-8x-b3-traceid: c36cdece10d31760x-usage-output-ops: 0x-used-mesh: Falsex-dc-location: Micros-3content-security-policy: frame-ancestors 'self' start.atlassian.com start.stg.atlassian.com atlaskit.atlassian.com bitbucket.org; base-uri 'self'; style-src 'self' 'unsafe-inline' https://aui-cdn.atlassian.com/ https://cdn.cookielaw.org/ https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/; object-src 'none'; script-src 'unsafe-eval' 'strict-dynamic' 'unsafe-inline' 'self' http: https: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net https://remote-app-switcher.prod-east.frontend.public.atl-paas.net https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/ 'nonce-ovn9EwskcBSacn1zJXJYjQ=='; default-src 'self' 'unsafe-inline' 'unsafe-eval' data: blob: *; connect-src bitbucket.org *.bitbucket.org bb-inf.net *.bb-inf.net id.atlassian.com api.atlassian.com api.stg.atlassian.com wss://bitbucketci-ws-service.services.atlassian.com/ wss://bitbucketci-ws-service.stg.services.atlassian.com/ wss://bitbucketci-ws-service.dev.services.atlassian.com/ analytics.atlassian.com atlassian-cookies--categories.us-east-1.prod.public.atl-paas.net as.atlassian.com api-private.stg.atlassian.com api-private.atlassian.com atl-global.atlassian.com cofs.staging.public.atl-paas.net cofs.prod.public.atl-paas.net fd-assets.prod.atl-paas.net flight-deck-assets-bifrost.prod-east.frontend.public.atl-paas.net intake.opbeat.com api.media.atlassian.com api.segment.io xid.statuspage.io xid.atlassian.com xid.sourcetreeapp.com bam.nr-data.net bam-cell.nr-data.net www.google-analytics.com sentry.io *.ingest.sentry.io events.launchdarkly.com app.launchdarkly.com fd-config.us-east-1.prod.public.atl-paas.net fd-config-bifrost.prod-east.frontend.public.atl-paas.net micros--prod-west--bitbucketci-file-service--files.s3.us-west-1.amazonaws.com micros--stg-west--bitbucketci-file-service--files.s3.us-west-1.amazonaws.com micros--ddev-west--bitbucketci-file-service--files.s3.ap-southeast-2.amazonaws.com bqlf8qjztdtr.statuspage.io https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/; report-uri https://web-security-reports.services.atlassian.com/csp-report/bb-websiteStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadDate: Fri, 05 Jul 2024 05:13:25 GMTx-usage-user-time: 0.038906x-usage-system-time: 0.000000x-served-by: f6032cce77e2x-envoy-upstream-service-time: 85content-language: enx-view-name: bitbucket.apps.downloads.views.download_filex-b3-spanid: c36cdece10d31760Accept-Ranges: bytesetag: "1b79e59cb74a2e1e43ad7c8dbd75a771"x-static-version: c26cc8291d0ax-render-time: 0.07297229766845703Connection: closex-usa
Source: ngentask.exe String found in binary or memory: http://geoplugin.net/json.gp
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, ngentask.exe, 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: http://geoplugin.net/json.gp/C
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe String found in binary or memory: http://q1hZ23sgCgRjxGo3okrkbBKNN.WvkGid5wJJ6hnHwW93cQrAz0UwbqGpQ
Source: poMkNYHDU3.exe, 00000000.00000002.2137467183.0000000002FBE000.00000040.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2888200920.000000000306D000.00000040.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562202832.0000000002839000.00000040.00000020.00020000.00000000.sdmp String found in binary or memory: http://q1hZ23sgCgRjxGo3okrkbBKNN.WvkGid5wJJ6hnHwW93cQrAz0UwbqGpQEBQg6vK9dvWwYrhPfY4r4fQbRGAsC1BPwTlv
Source: poMkNYHDU3.exe, 00000000.00000003.2136011705.0000000001272000.00000004.00000020.00020000.00000000.sdmp, poMkNYHDU3.exe, 00000000.00000002.2136963288.0000000001272000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://q1hz23sgcgrjxgo3okrkbbknn.wvkgid5wjj6hnhww93cqraz0uwbqgpq/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://q1hz23sgcgrjxgo3okrkbbknn.wvkgid5wjj6hnhww93cqraz0uwbqgpq/&
Source: poMkNYHDU3.exe, 00000000.00000003.2136011705.0000000001272000.00000004.00000020.00020000.00000000.sdmp, poMkNYHDU3.exe, 00000000.00000002.2136963288.0000000001272000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://q1hz23sgcgrjxgo3okrkbbknn.wvkgid5wjj6hnhww93cqraz0uwbqgpq/p
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: http://s.symcd.com06
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://admin.atlassian.com
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://api.bitbucket.org
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887982385.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689548428.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2557484053.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://aui-cdn.atlassian.com/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org//oP
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin.
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin1
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin;
Source: poMkNYHDU3.exe, 00000000.00000002.2137467183.0000000002FBE000.00000040.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2888200920.000000000306D000.00000040.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562202832.0000000002839000.00000040.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binHgINRxeNZtTt5kfm2ALc9vI9ixAk5Q
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binM
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013BB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binP
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bin_
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bine
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binj
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.binql
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/alfolod79597/advancedapi32/downloads/library.bins
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/blog/announcing-our-new-ci-cd-runtime-with-up-to-8x-faster-builds
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/blog/wp-json/wp/v2/posts?categories=196&context=embed&per_page=6&orderby=date&
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.org/gateway/api/emoji/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bitbucket.status.atlassian.com/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bqlf8qjztdtr.statuspage.io
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887982385.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689548428.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2557484053.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.cookielaw.org/
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: https://d.symcb.com/cps0%
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: https://d.symcb.com/rpa0
Source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr String found in binary or memory: https://d.symcb.com/rpa0.
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689619785.000000000146A000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689548428.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2557484053.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d136azpfpnge1l.cloudfront.net/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d136azpfpnge1l.cloudfront.net/;
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/css/entry/adg3-skeleton-nav.css
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/css/entry/adg3.css
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/css/entry/app.css
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/css/entry/vendor-aui-8.css
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/dist/webpack/app.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/dist/webpack/aui-8.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/dist/webpack/early.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/dist/webpack/locales/en.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/dist/webpack/sentry.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/dist/webpack/vendor.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/img/default_avatar/user_blue.svg
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/img/logos/bitbucket/android-chrome-192x192.png
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/img/logos/bitbucket/apple-touch-icon.png
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/img/logos/bitbucket/mstile-150x150.png
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/img/logos/bitbucket/safari-pinned-tab.svg
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://d301sr5gafysq2.cloudfront.net/c26cc8291d0a/jsi18n/en/djangojs.js
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://id.atlassian.com/login
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://id.atlassian.com/login?prompt=login&continue=https%3A%2F%2Fbitbucket.org%2Falfolod79597%
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://id.atlassian.com/logout
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://id.atlassian.com/manage-profile/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://id.atlassian.com/profile/rest/profile"
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://preferences.atlassian.com
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689548428.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2557484053.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887982385.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689548428.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2557484053.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689619785.000000000146A000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689548428.0000000001431000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000003.2557484053.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562941458.000000000C6A6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-websiteZ
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000003.2689395214.0000000001424000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.atlassian.com/try/cloud/signup?bundle=bitbucket
Source: unknown Network traffic detected: HTTP traffic on port 56195 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 56201
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 56195
Source: unknown Network traffic detected: HTTP traffic on port 56201 -> 443
Source: unknown HTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.4:56195 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.4:56201 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00408A72 SetWindowsHookExA 0000000D,00408A5E,00000000 15_2_00408A72
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Windows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004139D8 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 15_2_004139D8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004139D8 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 15_2_004139D8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004139D8 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard, 15_2_004139D8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00408B9A GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx, 15_2_00408B9A

E-Banking Fraud

barindex
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548983970.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7752, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7780, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 8068, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 4544, type: MEMORYSTR

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00418F13 SystemParametersInfoW, 15_2_00418F13

System Summary

barindex
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Author: unknown
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Author: unknown
Source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
Source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7752, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7780, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: Process Memory Space: ngentask.exe PID: 4544, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
Source: C:\Users\user\Desktop\poMkNYHDU3.exe File dump: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr 838599592 Jump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004138CB ExitWindowsEx,LoadLibraryA,GetProcAddress, 15_2_004138CB
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03072B20 0_2_03072B20
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03091330 0_2_03091330
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308E340 0_2_0308E340
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03092340 0_2_03092340
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03099340 0_2_03099340
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308AB50 0_2_0308AB50
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03082380 0_2_03082380
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030963B0 0_2_030963B0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030843D0 0_2_030843D0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307EBF0 0_2_0307EBF0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308A3F0 0_2_0308A3F0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03080BF0 0_2_03080BF0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03086A20 0_2_03086A20
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307EA30 0_2_0307EA30
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0301CA40 0_2_0301CA40
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03091A50 0_2_03091A50
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03082A80 0_2_03082A80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03092A80 0_2_03092A80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03096A80 0_2_03096A80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308EAA0 0_2_0308EAA0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307F2B0 0_2_0307F2B0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308B2C0 0_2_0308B2C0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307B2F0 0_2_0307B2F0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03087130 0_2_03087130
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03093930 0_2_03093930
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03083180 0_2_03083180
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03097180 0_2_03097180
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307F990 0_2_0307F990
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030501B0 0_2_030501B0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030A31BC 0_2_030A31BC
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308F1B0 0_2_0308F1B0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030821C0 0_2_030821C0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308B9C0 0_2_0308B9C0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030931E0 0_2_030931E0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307B9F0 0_2_0307B9F0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307C800 0_2_0307C800
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03087800 0_2_03087800
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03033020 0_2_03033020
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0304F020 0_2_0304F020
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03094020 0_2_03094020
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03093020 0_2_03093020
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03062830 0_2_03062830
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03086860 0_2_03086860
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03026070 0_2_03026070
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03097890 0_2_03097890
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308F8A0 0_2_0308F8A0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030838B0 0_2_030838B0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308C0D0 0_2_0308C0D0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307C0E0 0_2_0307C0E0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03098710 0_2_03098710
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03094720 0_2_03094720
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307CF30 0_2_0307CF30
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0302BF50 0_2_0302BF50
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03080770 0_2_03080770
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03083F80 0_2_03083F80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03092780 0_2_03092780
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03087F90 0_2_03087F90
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308C790 0_2_0308C790
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308FF90 0_2_0308FF90
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03097F90 0_2_03097F90
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308E7A0 0_2_0308E7A0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308AFB0 0_2_0308AFB0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03090E00 0_2_03090E00
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03094E40 0_2_03094E40
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03086E50 0_2_03086E50
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307D690 0_2_0307D690
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03090690 0_2_03090690
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308CEA0 0_2_0308CEA0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03080ED0 0_2_03080ED0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030846E0 0_2_030846E0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030886F0 0_2_030886F0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03085500 0_2_03085500
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03088540 0_2_03088540
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03089550 0_2_03089550
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03073D60 0_2_03073D60
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03095580 0_2_03095580
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308D5A0 0_2_0308D5A0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307DDB0 0_2_0307DDB0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03088DB0 0_2_03088DB0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307FDD0 0_2_0307FDD0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030735D0 0_2_030735D0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03087DD0 0_2_03087DD0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03084DE0 0_2_03084DE0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03098DE0 0_2_03098DE0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307AC00 0_2_0307AC00
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03085C10 0_2_03085C10
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03081C10 0_2_03081C10
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03091C10 0_2_03091C10
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03021450 0_2_03021450
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308DC50 0_2_0308DC50
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0305B480 0_2_0305B480
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03089C80 0_2_03089C80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03095CA0 0_2_03095CA0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0307E4B0 0_2_0307E4B0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_030914E0 0_2_030914E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030D5070 6_2_030D5070
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03140330 6_2_03140330
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03121B20 6_2_03121B20
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03139B50 6_2_03139B50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313D340 6_2_0313D340
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03141340 6_2_03141340
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03148340 6_2_03148340
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03131380 6_2_03131380
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031453B0 6_2_031453B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031333D0 6_2_031333D0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312FBF0 6_2_0312FBF0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312DBF0 6_2_0312DBF0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031393F0 6_2_031393F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312DA30 6_2_0312DA30
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03135A20 6_2_03135A20
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03140A50 6_2_03140A50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030CBA40 6_2_030CBA40
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03131A80 6_2_03131A80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03141A80 6_2_03141A80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03145A80 6_2_03145A80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312E2B0 6_2_0312E2B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313DAA0 6_2_0313DAA0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313A2C0 6_2_0313A2C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312A2F0 6_2_0312A2F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03136130 6_2_03136130
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03142930 6_2_03142930
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312E990 6_2_0312E990
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03132180 6_2_03132180
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03146180 6_2_03146180
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313E1B0 6_2_0313E1B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031521BC 6_2_031521BC
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030FF1B0 6_2_030FF1B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031311C0 6_2_031311C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313A9C0 6_2_0313A9C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312A9F0 6_2_0312A9F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031421E0 6_2_031421E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312B800 6_2_0312B800
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03136800 6_2_03136800
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03111830 6_2_03111830
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030E2020 6_2_030E2020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030FE020 6_2_030FE020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03143020 6_2_03143020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03142020 6_2_03142020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03135860 6_2_03135860
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03146890 6_2_03146890
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031328B0 6_2_031328B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313E8A0 6_2_0313E8A0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313B0D0 6_2_0313B0D0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312B0E0 6_2_0312B0E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03147710 6_2_03147710
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312BF30 6_2_0312BF30
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03143720 6_2_03143720
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030DAF50 6_2_030DAF50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312F770 6_2_0312F770
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03136F90 6_2_03136F90
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313B790 6_2_0313B790
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313EF90 6_2_0313EF90
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03146F90 6_2_03146F90
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03132F80 6_2_03132F80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03141780 6_2_03141780
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03139FB0 6_2_03139FB0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313D7A0 6_2_0313D7A0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313FE00 6_2_0313FE00
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03135E50 6_2_03135E50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03143E40 6_2_03143E40
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312C690 6_2_0312C690
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313F690 6_2_0313F690
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313BEA0 6_2_0313BEA0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312FED0 6_2_0312FED0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031376F0 6_2_031376F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031336E0 6_2_031336E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03134500 6_2_03134500
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03138550 6_2_03138550
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03137540 6_2_03137540
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03122D60 6_2_03122D60
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03144580 6_2_03144580
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312CDB0 6_2_0312CDB0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03137DB0 6_2_03137DB0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313C5A0 6_2_0313C5A0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031225D0 6_2_031225D0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312EDD0 6_2_0312EDD0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03136DD0 6_2_03136DD0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03133DE0 6_2_03133DE0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03147DE0 6_2_03147DE0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03134C10 6_2_03134C10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03130C10 6_2_03130C10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03140C10 6_2_03140C10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03129C00 6_2_03129C00
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0313CC50 6_2_0313CC50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_030D0450 6_2_030D0450
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0310A480 6_2_0310A480
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03138C80 6_2_03138C80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0312D4B0 6_2_0312D4B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03144CA0 6_2_03144CA0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031404E0 6_2_031404E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028A1070 7_2_028A1070
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FDA80 7_2_028FDA80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290DA80 7_2_0290DA80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02911A80 7_2_02911A80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02909AA0 7_2_02909AA0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FA2B0 7_2_028FA2B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029062C0 7_2_029062C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F62F0 7_2_028F62F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02901A20 7_2_02901A20
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F9A30 7_2_028F9A30
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290CA50 7_2_0290CA50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02897A40 7_2_02897A40
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FD380 7_2_028FD380
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029113B0 7_2_029113B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FF3D0 7_2_028FF3D0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029053F0 7_2_029053F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F9BF0 7_2_028F9BF0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FBBF0 7_2_028FBBF0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290C330 7_2_0290C330
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028EDB20 7_2_028EDB20
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02905B50 7_2_02905B50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02909340 7_2_02909340
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290D340 7_2_0290D340
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02914340 7_2_02914340
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02912890 7_2_02912890
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290A8A0 7_2_0290A8A0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FE8B0 7_2_028FE8B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029070D0 7_2_029070D0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F70E0 7_2_028F70E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F7800 7_2_028F7800
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02902800 7_2_02902800
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028AE020 7_2_028AE020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028CA020 7_2_028CA020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290E020 7_2_0290E020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290F020 7_2_0290F020
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028DD830 7_2_028DD830
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02901860 7_2_02901860
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FE180 7_2_028FE180
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02912180 7_2_02912180
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FA990 7_2_028FA990
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290A1B0 7_2_0290A1B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0291E1BC 7_2_0291E1BC
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028CB1B0 7_2_028CB1B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FD1C0 7_2_028FD1C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029069C0 7_2_029069C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290E1E0 7_2_0290E1E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F69F0 7_2_028F69F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02902130 7_2_02902130
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290E930 7_2_0290E930
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290B690 7_2_0290B690
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F8690 7_2_028F8690
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02907EA0 7_2_02907EA0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FBED0 7_2_028FBED0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029036F0 7_2_029036F0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FF6E0 7_2_028FF6E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290BE00 7_2_0290BE00
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02901E50 7_2_02901E50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290FE40 7_2_0290FE40
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02902F90 7_2_02902F90
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02907790 7_2_02907790
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290AF90 7_2_0290AF90
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02912F90 7_2_02912F90
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FEF80 7_2_028FEF80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290D780 7_2_0290D780
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02905FB0 7_2_02905FB0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029097A0 7_2_029097A0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02913710 7_2_02913710
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290F720 7_2_0290F720
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F7F30 7_2_028F7F30
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028A6F50 7_2_028A6F50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FB770 7_2_028FB770
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028D6480 7_2_028D6480
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02904C80 7_2_02904C80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02910CA0 7_2_02910CA0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F94B0 7_2_028F94B0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290C4E0 7_2_0290C4E0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02900C10 7_2_02900C10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0290CC10 7_2_0290CC10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F5C00 7_2_028F5C00
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FCC10 7_2_028FCC10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02908C50 7_2_02908C50
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0289C450 7_2_0289C450
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02910580 7_2_02910580
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02903DB0 7_2_02903DB0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029085A0 7_2_029085A0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028F8DB0 7_2_028F8DB0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02902DD0 7_2_02902DD0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028EE5D0 7_2_028EE5D0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FADD0 7_2_028FADD0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028FFDE0 7_2_028FFDE0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02913DE0 7_2_02913DE0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02900500 7_2_02900500
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02904550 7_2_02904550
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02903540 7_2_02903540
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028EED60 7_2_028EED60
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00435080 15_2_00435080
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0044F09C 15_2_0044F09C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0043420E 15_2_0043420E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00430294 15_2_00430294
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004422B0 15_2_004422B0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00411466 15_2_00411466
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0041A4FE 15_2_0041A4FE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0043C57C 15_2_0043C57C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00434643 15_2_00434643
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00424604 15_2_00424604
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004496B9 15_2_004496B9
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0042476D 15_2_0042476D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00432771 15_2_00432771
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0043C7AB 15_2_0043C7AB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004338FA 15_2_004338FA
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004239CC 15_2_004239CC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0043C9DA 15_2_0043C9DA
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00434A78 15_2_00434A78
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0041BA96 15_2_0041BA96
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00433DF6 15_2_00433DF6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00423F5B 15_2_00423F5B
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0044FF65 15_2_0044FF65
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: String function: 004310BE appears 38 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: String function: 00402053 appears 50 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: String function: 00431740 appears 53 times
Source: poMkNYHDU3.exe Static PE information: invalid certificate
Source: poMkNYHDU3.exe, 00000000.00000002.2136963288.0000000001296000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCmd.Exe.MUIj% vs poMkNYHDU3.exe
Source: poMkNYHDU3.exe, 00000000.00000003.2136011705.0000000001296000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilenameCmd.Exe.MUIj% vs poMkNYHDU3.exe
Source: poMkNYHDU3.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
Source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7752, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7780, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: Process Memory Space: ngentask.exe PID: 4544, type: MEMORYSTR Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
Source: poMkNYHDU3.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: cmd.exe, 00000009.00000002.2197758155.000000000268C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: AT;.CMD;.VBS;.VBp
Source: classification engine Classification label: mal100.rans.troj.spyw.evad.winEXE@18/4@6/3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00414706 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError, 15_2_00414706
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040D3C8 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle, 15_2_0040D3C8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00417CBB FindResourceA,LoadResource,LockResource,SizeofResource, 15_2_00417CBB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004172C8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 15_2_004172C8
Source: C:\Users\user\Desktop\poMkNYHDU3.exe File created: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7732:120:WilError_03
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7852:120:WilError_03
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Mutant created: \Sessions\1\BaseNamedObjects\exporteyuia-WNPSFO
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe File created: C:\Users\user\AppData\Local\Temp\advapi32.dll Jump to behavior
Source: poMkNYHDU3.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\poMkNYHDU3.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: poMkNYHDU3.exe ReversingLabs: Detection: 91%
Source: poMkNYHDU3.exe Virustotal: Detection: 56%
Source: C:\Users\user\Desktop\poMkNYHDU3.exe File read: C:\Users\user\Desktop\poMkNYHDU3.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\poMkNYHDU3.exe "C:\Users\user\Desktop\poMkNYHDU3.exe"
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe"
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe"
Source: unknown Process created: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe"
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\poMkNYHDU3.exe"
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\chcp.com chcp 65001
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe" Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe" Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\poMkNYHDU3.exe" Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe" Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\chcp.com chcp 65001 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: taskschd.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\SysWOW64\schtasks.exe Section loaded: xmllite.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Windows\SysWOW64\chcp.com Section loaded: ulib.dll Jump to behavior
Source: C:\Windows\SysWOW64\chcp.com Section loaded: fsutilext.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: winnsi.dll Jump to behavior
Source: C:\Windows\SysWOW64\PING.EXE Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: poMkNYHDU3.exe Static PE information: Virtual size of .text is bigger than: 0x100000
Source: poMkNYHDU3.exe Static file information: File size 1835944 > 1048576
Source: poMkNYHDU3.exe Static PE information: Raw size of .text is bigger than: 0x100000 < 0x185c00
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: poMkNYHDU3.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: poMkNYHDU3.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\jop tisaj\vepine\hejeboci bacalino tami.pdb source: poMkNYHDU3.exe, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr
Source: poMkNYHDU3.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: poMkNYHDU3.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: poMkNYHDU3.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: poMkNYHDU3.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: poMkNYHDU3.exe Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0041235F GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,FreeLibrary,GetProcAddress,FreeLibrary, 15_2_0041235F
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FCEA94 push ecx; ret 0_2_02FCEA97
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FCE344 push edx; retf 0_2_02FCE349
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FCC9BE push ecx; ret 0_2_02FCC9C0
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FCA583 push edx; iretd 0_2_02FCA56A
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FCA53E push edx; iretd 0_2_02FCA56A
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0307D344 push edx; retf 6_2_0307D349
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0307DA94 push ecx; ret 6_2_0307DA97
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0307B9BE push ecx; ret 6_2_0307B9C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0307953E push edx; iretd 6_2_0307956A
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03079583 push edx; iretd 6_2_0307956A
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02849A94 push ecx; ret 7_2_02849A97
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02849344 push edx; retf 7_2_02849349
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_028479BE push ecx; ret 7_2_028479C0
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02845583 push edx; iretd 7_2_0284556A
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_0284553E push edx; iretd 7_2_0284556A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 13_2_0304F61A pushad ; ret 13_2_0304F61D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004594FD push esi; ret 15_2_00459506
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00431786 push ecx; ret 15_2_00431799
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00453798 push eax; ret 15_2_004537B6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00440B2F push ss; iretd 15_2_00440B30
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00452E76 push ecx; ret 15_2_00452E89
Source: poMkNYHDU3.exe Static PE information: section name: .text entropy: 7.995191830949437
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.0.dr Static PE information: section name: .text entropy: 7.995191830949437
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00405CE1 ShellExecuteW,URLDownloadToFileW, 15_2_00405CE1
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe File created: \wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe File created: \wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe File created: \wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe File created: \wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe File created: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe"
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004172C8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle, 15_2_004172C8

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\poMkNYHDU3.exe"
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\poMkNYHDU3.exe" Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00432771 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 15_2_00432771
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040D26E Sleep,ExitProcess, 15_2_0040D26E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle, 15_2_00416FC6
Source: C:\Users\user\Desktop\poMkNYHDU3.exe API coverage: 0.8 %
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe API coverage: 1.5 %
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe API coverage: 6.7 %
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe API coverage: 1.8 %
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe TID: 8092 Thread sleep count: 39 > 30 Jump to behavior
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Last function: Thread delayed
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040A1C4 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, 15_2_0040A1C4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040620E FindFirstFileW,FindNextFileW, 15_2_0040620E
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004162EF FindFirstFileW,FindNextFileW,FindNextFileW, 15_2_004162EF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040A3CB FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, 15_2_0040A3CB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004187B1 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, 15_2_004187B1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00407AC0 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_00407AC0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00407ED2 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, 15_2_00407ED2
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00406EEF __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, 15_2_00406EEF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00406571 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,GetFileAttributesW,DeleteFileW,Sleep,StrToIntA,CreateDirectoryW, 15_2_00406571
Source: ngentask.exe, 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll5
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW [/
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.000000000141B000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000006.00000002.2887762018.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2562910829.000000000C670000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe, 00000007.00000002.2561964191.0000000000DA2000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW@ji
Source: poMkNYHDU3.exe, 00000000.00000003.2136011705.000000000124E000.00000004.00000020.00020000.00000000.sdmp, poMkNYHDU3.exe, 00000000.00000002.2136963288.000000000124E000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0308E340 LdrInitializeThunk, 0_2_0308E340
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03099BDC IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,LdrInitializeThunk, 0_2_03099BDC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0041235F GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,GetProcAddress,FreeLibrary,LoadLibraryA,GetProcAddress,FreeLibrary,GetProcAddress,FreeLibrary, 15_2_0041235F
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03136370 mov eax, dword ptr fs:[00000030h] 0_2_03136370
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FC8B10 mov eax, dword ptr fs:[00000030h] 0_2_02FC8B10
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FC8B10 mov eax, dword ptr fs:[00000030h] 0_2_02FC8B10
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0309E0B2 mov eax, dword ptr fs:[00000030h] 0_2_0309E0B2
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FC8C80 mov eax, dword ptr fs:[00000030h] 0_2_02FC8C80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_02FC8C80 mov eax, dword ptr fs:[00000030h] 0_2_02FC8C80
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0309ADBF mov eax, dword ptr fs:[00000030h] 0_2_0309ADBF
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03077B10 mov eax, dword ptr fs:[00000030h] 6_2_03077B10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03077B10 mov eax, dword ptr fs:[00000030h] 6_2_03077B10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031E5370 mov eax, dword ptr fs:[00000030h] 6_2_031E5370
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0314D0B2 mov eax, dword ptr fs:[00000030h] 6_2_0314D0B2
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03149DBF mov eax, dword ptr fs:[00000030h] 6_2_03149DBF
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03077C80 mov eax, dword ptr fs:[00000030h] 6_2_03077C80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03077C80 mov eax, dword ptr fs:[00000030h] 6_2_03077C80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02843B10 mov eax, dword ptr fs:[00000030h] 7_2_02843B10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02843B10 mov eax, dword ptr fs:[00000030h] 7_2_02843B10
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029B1370 mov eax, dword ptr fs:[00000030h] 7_2_029B1370
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029190B2 mov eax, dword ptr fs:[00000030h] 7_2_029190B2
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02843C80 mov eax, dword ptr fs:[00000030h] 7_2_02843C80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02843C80 mov eax, dword ptr fs:[00000030h] 7_2_02843C80
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02915DBF mov eax, dword ptr fs:[00000030h] 7_2_02915DBF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0043F394 mov eax, dword ptr fs:[00000030h] 15_2_0043F394
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0040F87E SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError, 15_2_0040F87E
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03099BDC IsProcessorFeaturePresent,LdrInitializeThunk,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,LdrInitializeThunk, 0_2_03099BDC
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0309A0DD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_0309A0DD
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0309D799 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_0309D799
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_03148BDC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 6_2_03148BDC
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_031490DD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 6_2_031490DD
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 6_2_0314C799 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 6_2_0314C799
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02914BDC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 7_2_02914BDC
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_029150DD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 7_2_029150DD
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Code function: 7_2_02918799 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 7_2_02918799
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00431347 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_00431347
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00438462 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 15_2_00438462
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00431495 SetUnhandledExceptionFilter, 15_2_00431495
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_0043190C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 15_2_0043190C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 protect: page read and write Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 protect: page read and write Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00414EA8 CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle, 15_2_00414EA8
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: FB0008 Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: 400000 Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Memory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe base: F90008 Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe 15_2_0040FC77
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00415E25 mouse_event, 15_2_00415E25
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe" Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe "C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe" Jump to behavior
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\poMkNYHDU3.exe" Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe" Jump to behavior
Source: C:\Users\user\mayo quaborod geriyak tarojob yeq vaj\Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe Process created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\chcp.com chcp 65001 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 Jump to behavior
Source: ngentask.exe, 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: [Program Manager]
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_03099DF5 cpuid 0_2_03099DF5
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetLocaleInfoW, 15_2_0044E084
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 15_2_0044E1AD
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetLocaleInfoW, 15_2_0044E2B4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 15_2_0044E381
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetLocaleInfoA, 15_2_0040D39C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: EnumSystemLocalesW, 15_2_00444444
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetLocaleInfoW, 15_2_0044492D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, 15_2_0044DA49
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: EnumSystemLocalesW, 15_2_0044DCC1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: EnumSystemLocalesW, 15_2_0044DD0C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: EnumSystemLocalesW, 15_2_0044DDA7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 15_2_0044DE34
Source: C:\Users\user\Desktop\poMkNYHDU3.exe Code function: 0_2_0063BB4F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_0063BB4F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_00417E20 GetUserNameW, 15_2_00417E20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: 15_2_004453ED _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte, 15_2_004453ED
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548983970.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7752, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7780, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 8068, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 4544, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: \AppData\Local\Google\Chrome\User Data\Default\Login Data 15_2_0040A0A6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: \AppData\Roaming\Mozilla\Firefox\Profiles\ 15_2_0040A1C4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: \key3.db 15_2_0040A1C4

Remote Access Functionality

barindex
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.ngentask.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.dda7b0.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.c520000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.3.Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe.10030000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.2887344523.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2561964191.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2414960538.0000000010030000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548983970.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.2548812652.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2548613338.000000000C520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.2894169812.0000000010130000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2537844903.000000000C520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000003.2425972024.0000000010030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7752, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: Wep saqua quox vovaquo pofiyoha hotejemi nikaga gedel logim mobevem.exe PID: 7780, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 8068, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: ngentask.exe PID: 4544, type: MEMORYSTR
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe Code function: cmd.exe 15_2_00405671
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs