Click to jump to signature section
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack | Malware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.solucionesmexico.mx", "Username": "mynewfile@solucionesmexico.mx", "Password": "dGG^ZYIxX5!B"} |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: NUGMrDcg4v.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q |
Source: NUGMrDcg4v.exe | String found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t |
Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003158000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com |
Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ip-api.com/line/?fields=hosting |
Source: NUGMrDcg4v.exe | String found in binary or memory: http://localhost/calculator_server/requests.php |
Source: NUGMrDcg4v.exe | String found in binary or memory: http://ocsp.comodoca.com0 |
Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003081000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000313C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://account.dyn.com/ |
Source: NUGMrDcg4v.exe | String found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0 |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen |
Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_01713E28 | 0_2_01713E28 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_01716F90 | 0_2_01716F90 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0171DFB4 | 0_2_0171DFB4 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_05616CC8 | 0_2_05616CC8 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_05610040 | 0_2_05610040 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_05610006 | 0_2_05610006 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_05616C98 | 0_2_05616C98 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_07930E00 | 0_2_07930E00 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0793AC88 | 0_2_0793AC88 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0793B8A0 | 0_2_0793B8A0 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0793AFD0 | 0_2_0793AFD0 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_07934708 | 0_2_07934708 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_07933E98 | 0_2_07933E98 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_07933E88 | 0_2_07933E88 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_07935E30 | 0_2_07935E30 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_07930DF0 | 0_2_07930DF0 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_079342D0 | 0_2_079342D0 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_079359F8 | 0_2_079359F8 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B10E300 | 0_2_0B10E300 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B106AC8 | 0_2_0B106AC8 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B109010 | 0_2_0B109010 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B100040 | 0_2_0B100040 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B108928 | 0_2_0B108928 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B1039B9 | 0_2_0B1039B9 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B100007 | 0_2_0B100007 |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Code function: 0_2_0B105CC8 | 0_2_0B105CC8 |
Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004162000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameMontero.dll8 vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000002.2548328749.00000000078A0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameMontero.dll8 vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000002.2547134145.0000000005B10000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameArthur.dll" vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.000000000318C000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameArthur.dll" vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000002.2543376911.000000000143E000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000000.1287254905.0000000000CE2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameehGbG.exe" vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs NUGMrDcg4v.exe |
Source: NUGMrDcg4v.exe | Binary or memory string: OriginalFilenameehGbG.exe" vs NUGMrDcg4v.exe |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers |
Source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload |
Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003174000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003186000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key)); |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: vcruntime140_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: ucrtbase_clr0400.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: iconcodecservice.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: wbemcomn.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: rasapi32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: rasman.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: rtutils.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: dhcpcsvc6.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: dhcpcsvc.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: vaultcli.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: NUGMrDcg4v.exe, 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.0000000003158000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmp, NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: SBIEDLL.DLL |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: 16F0000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: 3080000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: 5080000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: 8060000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: 9060000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: 9210000 memory reserve | memory write watch | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Memory allocated: A210000 memory reserve | memory write watch | Jump to behavior |
Source: NUGMrDcg4v.exe, 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMware |
Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: vmware |
Source: NUGMrDcg4v.exe, 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: VMwareVBox |
Source: NUGMrDcg4v.exe, 00000000.00000002.2547764879.00000000062F2000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Users\user\Desktop\NUGMrDcg4v.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation | Jump to behavior |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\NUGMrDcg4v.exe | Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities | Jump to behavior |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2544569965.00000000030C7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.40c5590.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.7610000.6.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.NUGMrDcg4v.exe.4089970.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000002.2548008530.0000000007610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2545510674.0000000004081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: NUGMrDcg4v.exe PID: 7816, type: MEMORYSTR |