Loading ...

Play interactive tourEdit tour

Analysis Report Orden n.#U00ba STL21119, pdf.exe

Overview

General Information

Sample Name:Orden n.#U00ba STL21119, pdf.exe
Analysis ID:341479
MD5:35ac4ad018dc2bcdfaeff01decd3e8fe
SHA1:6dbe8e66f9e1c0f59169b7c7aff0bcdb9c789ecc
SHA256:9a74f71ee76b3652042a3f5e1f5e4a8bacc97a3c72b28baa37008169170ab980
Tags:exeNanoCorenVpnRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Orden n.#U00ba STL21119, pdf.exe (PID: 2160 cmdline: 'C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe' MD5: 35AC4AD018DC2BCDFAEFF01DECD3E8FE)
    • schtasks.exe (PID: 6324 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 6376 cmdline: {path} MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 6424 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD3F6.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6504 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpD714.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 6556 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 6644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6652 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 6704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6948 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 6956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5eef5:$x1: NanoCore.ClientPluginHost
  • 0x5ef32:$x2: IClientNetworkHost
  • 0x62a65:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x5ec5d:$a: NanoCore
    • 0x5ec6d:$a: NanoCore
    • 0x5eea1:$a: NanoCore
    • 0x5eeb5:$a: NanoCore
    • 0x5eef5:$a: NanoCore
    • 0x5ecbc:$b: ClientPlugin
    • 0x5eebe:$b: ClientPlugin
    • 0x5eefe:$b: ClientPlugin
    • 0x5ede3:$c: ProjectData
    • 0x5f7ea:$d: DESCrypto
    • 0x671b6:$e: KeepAlive
    • 0x651a4:$g: LogClientMessage
    • 0x6139f:$i: get_Connected
    • 0x5fb20:$j: #=q
    • 0x5fb50:$j: #=q
    • 0x5fb6c:$j: #=q
    • 0x5fb9c:$j: #=q
    • 0x5fbb8:$j: #=q
    • 0x5fbd4:$j: #=q
    • 0x5fc04:$j: #=q
    • 0x5fc20:$j: #=q
    00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1b64c5:$x1: NanoCore.ClientPluginHost
      • 0x1b6502:$x2: IClientNetworkHost
      • 0x1ba035:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 6 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6376, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe' , ParentImage: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe, ParentProcessId: 2160, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp', ProcessId: 6324

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for domain / URLShow sources
      Source: graceland777.ddns.netVirustotal: Detection: 9%Perma Link
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORY
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\kSLtgWcvnYChD.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: Orden n.#U00ba STL21119, pdf.exeJoe Sandbox ML: detected

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: Orden n.#U00ba STL21119, pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Uses new MSVCR DllsShow sources
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: Orden n.#U00ba STL21119, pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.4.dr
      Source: Binary string: mscorrc.pdb source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.256646901.0000000006A70000.00000002.00000001.sdmp
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

      Networking:

      barindex
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: graceland777.ddns.net
      Source: global trafficTCP traffic: 192.168.2.7:49719 -> 185.140.53.129:7771
      Source: Joe Sandbox ViewIP Address: 185.140.53.129 185.140.53.129
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 52.147.198.201
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 52.147.198.201
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
      Source: unknownDNS traffic detected: queries for: graceland777.ddns.net
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: Orden n.#U00ba STL21119, pdf.exeString found in binary or memory: http://tempuri.org/experimentDataSet.xsd
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.235744129.0000000004E59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com4
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236378393.0000000004E54000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comFE
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.250139567.0000000004E50000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236207180.0000000004E54000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236378393.0000000004E54000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsN
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.250139567.0000000004E50000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com=
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236378393.0000000004E54000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comitu4
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.235744129.0000000004E59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comnc./
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.235744129.0000000004E59000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comrsiv
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.250139567.0000000004E50000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comueva
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.232476563.0000000004E8D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/://w
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233911270.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/=
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/F
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233731851.0000000004E59000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/W
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233911270.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234132501.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0p
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/=
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/W
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233813362.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/k
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/k
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233731851.0000000004E59000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l-b
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmp, Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.230775592.0000000004E57000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.230775592.0000000004E57000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comJ
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.232650399.0000000004E54000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comH
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49689
      Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49677
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49675
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49689 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.250833350.0000000000B5B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_02755864
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_02751A58
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_02751158
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_027545C0
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_02751A49
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_02753E2A
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_02751148
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_0275E31A
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_027517B0
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_027545B0
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_0275179F
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_06471B82
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_06471BE2
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 9_2_026D1DF8
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 9_2_026D0708
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_001F6950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_001F6D08
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_001F692F
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00B20708
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00CD6D08
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00CD6950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00CD692F
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_02F50708
      Source: dhcpmon.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.258469523.0000000006F30000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.258469523.0000000006F30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000000.229710277.00000000003BE000.00000002.00020000.sdmpBinary or memory string: OriginalFilename vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.257751566.0000000006C20000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.250833350.0000000000B5B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTypeLibImporterFlags.dll4 vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.256127446.00000000068E0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.256646901.0000000006A70000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exeBinary or memory string: OriginalFilename vs Orden n.#U00ba STL21119, pdf.exe
      Source: Orden n.#U00ba STL21119, pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: dhcpmon.exe, 0000000C.00000000.258878838.00000000001F2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000E.00000000.273388354.0000000000CD2000.00000002.00020000.sdmp, dhcpmon.exe.4.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
      Source: dhcpmon.exe, 0000000C.00000000.258878838.00000000001F2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000E.00000000.273388354.0000000000CD2000.00000002.00020000.sdmp, dhcpmon.exe.4.drBinary or memory string: MSBuild MyApp.csproj /t:Clean /p:Configuration=Debug
      Source: dhcpmon.exe, 0000000C.00000000.258878838.00000000001F2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000E.00000000.273388354.0000000000CD2000.00000002.00020000.sdmp, dhcpmon.exe.4.drBinary or memory string: *.sln+AmbiguousProjectError'MissingProjectError)ProjectNotFoundError)InvalidPropertyError
      Source: dhcpmon.exeBinary or memory string: *.sln
      Source: dhcpmon.exe, 0000000E.00000002.276243130.00000000032F1000.00000004.00000001.sdmpBinary or memory string: q*)C:\Program Files (x86)\DHCP Monitor\*.sln
      Source: classification engineClassification label: mal100.troj.evad.winEXE@18/16@4/2
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_064417DA AdjustTokenPrivileges,
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_064417A3 AdjustTokenPrivileges,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile created: C:\Users\user\AppData\Roaming\kSLtgWcvnYChD.exeJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6956:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6644:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f7d05b5d-02c5-486b-afe2-be27c9d37bca}
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMutant created: \Sessions\1\BaseNamedObjects\nTphvImrYR
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6432:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6512:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6704:120:WilError_01
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp40AA.tmpJump to behavior
      Source: Orden n.#U00ba STL21119, pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile read: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe 'C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD3F6.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpD714.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp'
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD3F6.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpD714.tmp'
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: Orden n.#U00ba STL21119, pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Orden n.#U00ba STL21119, pdf.exeStatic file information: File size 1074176 > 1048576
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: Orden n.#U00ba STL21119, pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.4.dr
      Source: Binary string: mscorrc.pdb source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.256646901.0000000006A70000.00000002.00000001.sdmp
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_026A0A29 push 00000002h; retn 0010h
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_026A0A0C push 00000002h; ret
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeCode function: 0_2_0275D1B4 push edi; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.08615591885
      Source: initial sampleStatic PE information: section name: .text entropy: 7.08615591885
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile created: C:\Users\user\AppData\Roaming\kSLtgWcvnYChD.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
      Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (31).png
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM_3Show sources
      Source: Yara matchFile source: 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORY
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLX1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAMEX1
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 384
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 1242
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 475
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 707
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 596
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe TID: 4844Thread sleep time: -31500s >= -30000s
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe TID: 4992Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6540Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6760Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6816Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7000Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253563848.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: VMware
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: vmwareX1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253563848.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: VMWARE|9
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: q#"SOFTWARE\VMware, Inc.\VMware ToolsX1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: q&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\X1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253563848.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: VMware|9
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIX1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253563848.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: VMware |9
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253563848.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: VMWAREX1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253563848.0000000002EA7000.00000004.00000001.sdmpBinary or memory string: VMware
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251624873.0000000002B41000.00000004.00000001.sdmpBinary or memory string: QEMUX1
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 protect: page execute and read and write
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 value starts with: 4D5A
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 402000
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 420000
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 422000
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 93D008
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp'
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD3F6.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpD714.tmp'
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORY

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: MSBuild.exe, 00000004.00000003.309906451.000000000426B000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Orden n.#U00ba STL21119, pdf.exe PID: 2160, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Access Token Manipulation1Masquerading12Input Capture1Security Software Discovery121Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsProcess Injection311Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection311LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 341479 Sample: Orden n.#U00ba STL21119, pdf.exe Startdate: 19/01/2021 Architecture: WINDOWS Score: 100 54 Multi AV Scanner detection for domain / URL 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->58 60 10 other signatures 2->60 8 Orden n.#U00ba STL21119, pdf.exe 6 2->8         started        12 dhcpmon.exe 6 2->12         started        14 dhcpmon.exe 5 2->14         started        16 MSBuild.exe 4 2->16         started        process3 file4 44 C:\Users\user\AppData\...\kSLtgWcvnYChD.exe, PE32 8->44 dropped 46 C:\Users\user\AppData\Local\...\tmp40AA.tmp, XML 8->46 dropped 48 C:\...\Orden n.#U00ba STL21119, pdf.exe.log, ASCII 8->48 dropped 62 Writes to foreign memory regions 8->62 64 Allocates memory in foreign processes 8->64 66 Injects a PE file into a foreign processes 8->66 18 MSBuild.exe 1 16 8->18         started        22 schtasks.exe 1 8->22         started        24 conhost.exe 12->24         started        26 conhost.exe 14->26         started        28 conhost.exe 16->28         started        signatures5 process6 dnsIp7 50 graceland777.ddns.net 185.140.53.129, 49719, 7771 DAVID_CRAIGGG Sweden 18->50 52 192.168.2.1 unknown unknown 18->52 40 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 18->40 dropped 42 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->42 dropped 30 schtasks.exe 1 18->30         started        32 schtasks.exe 1 18->32         started        34 conhost.exe 22->34         started        file8 process9 process10 36 conhost.exe 30->36         started        38 conhost.exe 32->38         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Orden n.#U00ba STL21119, pdf.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\kSLtgWcvnYChD.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

      Unpacked PE Files

      No Antivirus matches

      Domains

      SourceDetectionScannerLabelLink
      graceland777.ddns.net10%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      http://www.jiyu-kobo.co.jp/://w0%Avira URL Cloudsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.fontbureau.comueva0%Avira URL Cloudsafe
      http://www.fontbureau.comitu40%Avira URL Cloudsafe
      http://www.fontbureau.comFE0%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.fontbureau.comalsN0%Avira URL Cloudsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.tiro.comH0%Avira URL Cloudsafe
      http://www.sajatypeworks.comJ0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/jp/=0%Avira URL Cloudsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.fontbureau.com40%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/Y0p0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/jp/k0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/l-b0%Avira URL Cloudsafe
      http://www.fontbureau.comrsiv0%Avira URL Cloudsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/W0%Avira URL Cloudsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.fontbureau.comnc./0%Avira URL Cloudsafe
      http://www.fontbureau.come.com=0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/W0%Avira URL Cloudsafe
      http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/F0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/=0%Avira URL Cloudsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn/0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/k0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/k0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/k0%URL Reputationsafe
      http://www.fontbureau.comals0%URL Reputationsafe
      http://www.fontbureau.comals0%URL Reputationsafe
      http://www.fontbureau.comals0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      graceland777.ddns.net
      185.140.53.129
      truetrueunknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.jiyu-kobo.co.jp/://wOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designersGOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.com/designers/?Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comuevaOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.250139567.0000000004E50000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers?Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.comitu4Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236378393.0000000004E54000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comFEOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236378393.0000000004E54000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.tiro.comOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.fontbureau.comalsNOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236378393.0000000004E54000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designersOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              high
              http://www.goodfont.co.krOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.tiro.comHOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.232650399.0000000004E54000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.comJOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.230775592.0000000004E57000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp/=Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.comOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmp, Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.230775592.0000000004E57000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.typography.netDOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cn/cTheOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.galapagosdesign.com/staff/dennis.htmOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://fontfabrik.comOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com4Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.235744129.0000000004E59000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/Y0pOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234132501.0000000004E61000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp/kOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233813362.0000000004E61000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.galapagosdesign.com/DPleaseOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/l-bOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233731851.0000000004E59000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.comrsivOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.235744129.0000000004E59000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fonts.comOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                high
                http://www.sandoll.co.krOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.urwpp.deDPleaseOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.zhongyicts.com.cnOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/jp/WOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sakkal.comOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.comnc./Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.235744129.0000000004E59000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.come.com=Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.250139567.0000000004E50000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.apache.org/licenses/LICENSE-2.0Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.comOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/WOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233731851.0000000004E59000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/FOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comaOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.250139567.0000000004E50000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/=Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233911270.0000000004E61000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comlOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.232476563.0000000004E8D000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cnOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.htmlOrden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/Y0/Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.233911270.0000000004E61000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Orden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/kOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.234324187.0000000004E61000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8Orden n.#U00ba STL21119, pdf.exe, 00000000.00000002.254667323.0000000004F40000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comalsOrden n.#U00ba STL21119, pdf.exe, 00000000.00000003.236207180.0000000004E54000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          185.140.53.129
                          unknownSweden
                          209623DAVID_CRAIGGGtrue

                          Private

                          IP
                          192.168.2.1

                          General Information

                          Joe Sandbox Version:31.0.0 Red Diamond
                          Analysis ID:341479
                          Start date:19.01.2021
                          Start time:13:00:14
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 12s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:Orden n.#U00ba STL21119, pdf.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:36
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@18/16@4/2
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 1.2% (good quality ratio 0%)
                          • Quality average: 0%
                          • Quality standard deviation: 0%
                          HCA Information:
                          • Successful, ratio: 92%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                          • TCP Packets have been reduced to 100
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 104.43.139.144, 104.43.193.48, 104.84.56.60, 51.104.139.180, 13.88.21.125, 205.185.216.10, 205.185.216.42, 51.103.5.186, 92.122.213.247, 92.122.213.201, 52.254.96.93, 20.54.26.129, 52.255.188.83
                          • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, bn2eap.displaycatalog.md.mp.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          13:01:09API Interceptor1x Sleep call for process: Orden n.#U00ba STL21119, pdf.exe modified
                          13:01:16AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                          13:01:18Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)
                          13:01:18Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          185.140.53.129Orden n.#U00ba 21115, pdf.exeGet hashmaliciousBrowse
                            PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                              PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                RFQPR2000293356.exeGet hashmaliciousBrowse
                                  PO#4500139207.exeGet hashmaliciousBrowse
                                    Shipping Documents Maersk Kleven.exeGet hashmaliciousBrowse
                                      T2kRjvHnWc.exeGet hashmaliciousBrowse
                                        NEW PO # 20001578.exeGet hashmaliciousBrowse
                                          Ordine R20 T40567, pdf.exeGet hashmaliciousBrowse
                                            Ordine R20 T4077 TBA 2020, pdf.exeGet hashmaliciousBrowse
                                              Orden CW62175Q.exeGet hashmaliciousBrowse
                                                Ordine R20-T4077, pdf.exeGet hashmaliciousBrowse
                                                  Importa ed esporta tariffa di spedizione.exeGet hashmaliciousBrowse
                                                    91HN20DCI100053,54,80.exeGet hashmaliciousBrowse

                                                      Domains

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      graceland777.ddns.netOrden n.#U00ba 21115, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      Ordine R20 T40567, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      Ordine R20 T4077 TBA 2020, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      Ordine R20-T4077, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      Orden CW62175Q, pdf.exeGet hashmaliciousBrowse
                                                      • 185.244.30.19
                                                      Orden CW62125Q, pdf.exeGet hashmaliciousBrowse
                                                      • 185.244.30.19
                                                      Orden CW62125Q, pdf.exeGet hashmaliciousBrowse
                                                      • 185.244.30.19
                                                      Orden CW62125Q, pdf.exeGet hashmaliciousBrowse
                                                      • 216.38.2.218
                                                      DHL Shipping Documents Original BL, Inv, parking list, pdf.exeGet hashmaliciousBrowse
                                                      • 23.105.131.131

                                                      ASN

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      DAVID_CRAIGGGProof of Payment.exeGet hashmaliciousBrowse
                                                      • 185.244.30.51
                                                      DxCHoDnNLn.exeGet hashmaliciousBrowse
                                                      • 185.140.53.202
                                                      T7gzTHDZ7g.rtfGet hashmaliciousBrowse
                                                      • 185.140.53.202
                                                      PO - 2021-000511.exeGet hashmaliciousBrowse
                                                      • 185.244.30.69
                                                      PO AR483-1590436 _ J-3000 PROJT.xlsxGet hashmaliciousBrowse
                                                      • 185.140.53.202
                                                      Qotation.exeGet hashmaliciousBrowse
                                                      • 185.140.53.154
                                                      PO - 2021-000511.exeGet hashmaliciousBrowse
                                                      • 185.244.30.69
                                                      file.exeGet hashmaliciousBrowse
                                                      • 91.193.75.155
                                                      Orden n.#U00ba 21115, pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.129
                                                      Lists.exeGet hashmaliciousBrowse
                                                      • 185.140.53.136
                                                      Quotation Request.exeGet hashmaliciousBrowse
                                                      • 185.244.30.171
                                                      PO-PDF_PDF.exeGet hashmaliciousBrowse
                                                      • 185.244.30.69
                                                      Quiero hacer el pedido de su producto.exeGet hashmaliciousBrowse
                                                      • 185.244.30.18
                                                      PO 047428.xlsxGet hashmaliciousBrowse
                                                      • 185.140.53.183
                                                      SLIP.exeGet hashmaliciousBrowse
                                                      • 185.244.30.171
                                                      2owa3HlP0V.exeGet hashmaliciousBrowse
                                                      • 185.140.53.183
                                                      TAtAHTebr6.exeGet hashmaliciousBrowse
                                                      • 185.140.53.183
                                                      Quotation.exeGet hashmaliciousBrowse
                                                      • 185.244.30.29
                                                      Halkbank_Ekstre_20210118_162356_389771.exeGet hashmaliciousBrowse
                                                      • 91.193.75.189
                                                      Urgent order 1812021-672 Q30721,pdf.exeGet hashmaliciousBrowse
                                                      • 185.140.53.131

                                                      JA3 Fingerprints

                                                      No context

                                                      Dropped Files

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeOrden n.#U00ba 21115, pdf.exeGet hashmaliciousBrowse
                                                        PO-WJO-001, pdf.exeGet hashmaliciousBrowse
                                                          DFR2154747.vbeGet hashmaliciousBrowse
                                                            SOA Dec2020.exeGet hashmaliciousBrowse
                                                              SecuriteInfo.com.Variant.Mikey.117100.12986.exeGet hashmaliciousBrowse
                                                                SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeGet hashmaliciousBrowse
                                                                  Purchase Order PDF pdf.exeGet hashmaliciousBrowse
                                                                    Orden CW62125Q, pdf.exeGet hashmaliciousBrowse
                                                                      7444478441.jsGet hashmaliciousBrowse
                                                                        7444478441.jsGet hashmaliciousBrowse
                                                                          7444478441.jsGet hashmaliciousBrowse
                                                                            5HuSdWXs4n.exeGet hashmaliciousBrowse
                                                                              ABU.exeGet hashmaliciousBrowse
                                                                                LI-TAK P0 TVOP CK-20-08-30 203008,pdf.exeGet hashmaliciousBrowse
                                                                                  ppp.exeGet hashmaliciousBrowse
                                                                                    787774778.jsGet hashmaliciousBrowse
                                                                                      12477123690.jsGet hashmaliciousBrowse
                                                                                        12477123690.jsGet hashmaliciousBrowse
                                                                                          order pdf.exeGet hashmaliciousBrowse
                                                                                            Documents RF V23665.exeGet hashmaliciousBrowse

                                                                                              Created / dropped Files

                                                                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):69632
                                                                                              Entropy (8bit):5.20894581699571
                                                                                              Encrypted:false
                                                                                              SSDEEP:768:NElGiBcBuiyFjUwF0wdP9/rJMDnRFRJfStGpwV3e3qtAcy:ilGBu7jjP9/tMDn9Jt+VO3GO
                                                                                              MD5:88BBB7610152B48C2B3879473B17857E
                                                                                              SHA1:0F6CF8DD66AA58CE31DA4E8AC0631600EF055636
                                                                                              SHA-256:2C7ACC16D19D076D67E9F1F37984935899B79536C9AC6EEC8850C44D20F87616
                                                                                              SHA-512:5BACDF6C190A76C2C6A9A3519936E08E898AC8A2B1384D60429DF850BE778860435BF9E5EB316517D2345A5AAE201F369863F7A242134253978BCB5B2179CA58
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: Orden n.#U00ba 21115, pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: PO-WJO-001, pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: DFR2154747.vbe, Detection: malicious, Browse
                                                                                              • Filename: SOA Dec2020.exe, Detection: malicious, Browse
                                                                                              • Filename: SecuriteInfo.com.Variant.Mikey.117100.12986.exe, Detection: malicious, Browse
                                                                                              • Filename: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe, Detection: malicious, Browse
                                                                                              • Filename: Purchase Order PDF pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: Orden CW62125Q, pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: 7444478441.js, Detection: malicious, Browse
                                                                                              • Filename: 7444478441.js, Detection: malicious, Browse
                                                                                              • Filename: 7444478441.js, Detection: malicious, Browse
                                                                                              • Filename: 5HuSdWXs4n.exe, Detection: malicious, Browse
                                                                                              • Filename: ABU.exe, Detection: malicious, Browse
                                                                                              • Filename: LI-TAK P0 TVOP CK-20-08-30 203008,pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: ppp.exe, Detection: malicious, Browse
                                                                                              • Filename: 787774778.js, Detection: malicious, Browse
                                                                                              • Filename: 12477123690.js, Detection: malicious, Browse
                                                                                              • Filename: 12477123690.js, Detection: malicious, Browse
                                                                                              • Filename: order pdf.exe, Detection: malicious, Browse
                                                                                              • Filename: Documents RF V23665.exe, Detection: malicious, Browse
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.....................@........... ........@.. .......................@......99....@.....................................S.......`/................... ....................................................... ............... ..H............text....... ...................... ..`.rsrc...`/.......0..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBuild.exe.log
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):325
                                                                                              Entropy (8bit):5.334380084018418
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                                                                                              MD5:65CE98936A67552310EFE2F0FF5BDF88
                                                                                              SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                                                                                              SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                                                                                              SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                                                                                              Malicious:false
                                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Orden n.#U00ba STL21119, pdf.exe.log
                                                                                              Process:C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):525
                                                                                              Entropy (8bit):5.2874233355119316
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                              MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                              SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                              SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                              SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                              Malicious:true
                                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):441
                                                                                              Entropy (8bit):5.388715099859351
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:Q3LaJU20NaL10U2+gYhD5itZbgbe4MqJsGMe4M6:MLF20NaL32+g2OH4xvn4j
                                                                                              MD5:88F0104DB9A3F9BC4F0FC3805F571B0D
                                                                                              SHA1:CDD4F34385792F0CCE0A844F4ABB447C25AB4E73
                                                                                              SHA-256:F6C11D3D078ED73F2640DA510E68DEEAA5F14F79CAE2E23A254B4E37C7D0230F
                                                                                              SHA-512:04B977F63CAB8DE20EA7EFA9D4299C2E625D92FA6D54CA03EECD9F322E978326B353824F23BEC0E712083BDE0DBC5CC4EE90922137106B096050CA46A166DF0E
                                                                                              Malicious:false
                                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                              C:\Users\user\AppData\Local\Temp\tmp40AA.tmp
                                                                                              Process:C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1662
                                                                                              Entropy (8bit):5.177106365791287
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:2dH4+SEqC/dp7hdMlNMFpdU/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB79tn:cbhH7MlNQ8/rydbz9I3YODOLNdq3h3
                                                                                              MD5:8C39B8F056EDC5EE83D6EB5DCB1887DD
                                                                                              SHA1:B45B25390914435C2653B427FF1C709FDCA4ED7D
                                                                                              SHA-256:67D331680E679E2081D602E84CE2F256841D11FBCDB9A312828BD9ED3754B4A8
                                                                                              SHA-512:52F002527995A7AB752A5B52B4AD349C6101BCDAEA57B5D82B760567EA51D78CF18892AC5C271512C42EAA07D81664F7FAD228D34E35D859209F4D37ADD18E01
                                                                                              Malicious:true
                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAv
                                                                                              C:\Users\user\AppData\Local\Temp\tmpD3F6.tmp
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1320
                                                                                              Entropy (8bit):5.136963558289723
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                                                                                              MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                                                                                              SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                                                                                              SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                                                                                              SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                                                                                              Malicious:false
                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                              C:\Users\user\AppData\Local\Temp\tmpD714.tmp
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):1310
                                                                                              Entropy (8bit):5.109425792877704
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                              Malicious:false
                                                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):128
                                                                                              Entropy (8bit):6.527114648336088
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:XrURGizD7cnRH5/ljRAaTlKYrI1Sj9txROIsxcMek2:X4LDAn1rplKTYBROIsxek2
                                                                                              MD5:0A9C5EAE8756D6FC90F59D8D71A79E1E
                                                                                              SHA1:0F7D6AAED17CD18DC614535ED26335C147E29ED7
                                                                                              SHA-256:B1921EA14C66927397BAF3FA456C22B93C30C3DE23546087C0B18551CE5001C5
                                                                                              SHA-512:78C2F399AC49C78D89915DFF99AC955B5E0AB07BAAD61B07B0CE073C88C1D3A9F1D302C2413691B349DD34441B0FF909C08A4F71E2F1B73F46C1FF308BC7CF9A
                                                                                              Malicious:false
                                                                                              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P.OT....g.t......'7......)..8zII..K/....n3...3.5.......&.7].)..wL...:}g...@...mV.....JUP...w
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:ISO-8859 text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):8
                                                                                              Entropy (8bit):3.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:HEn:kn
                                                                                              MD5:574515807DB36F5348D3C83B852906BB
                                                                                              SHA1:5A18634E11FC602F57987BFE4FA27BCAD6E5C507
                                                                                              SHA-256:07994CBBA08913C70ECCB749D60E3D0FC87AA1C39759641C1D26F20EFFFAB284
                                                                                              SHA-512:17496D4765A425ECB286DE50C026F4E53F4EDA580182FDCC8C6FFA5DAF6F9F7DCCC0908445E728814CDD9E9EDCDCCEC07B047931ACA9EB9D69530EF2B5FB1F11
                                                                                              Malicious:true
                                                                                              Preview: ..<\...H
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):40
                                                                                              Entropy (8bit):5.153055907333276
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                                                              MD5:4E5E92E2369688041CC82EF9650EDED2
                                                                                              SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                                                              SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                                                              SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                                                              Malicious:false
                                                                                              Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):367496
                                                                                              Entropy (8bit):7.999535722214108
                                                                                              Encrypted:true
                                                                                              SSDEEP:6144:3rv1Xjouu5ZMQajChQSE0Rp30gbdoh5Y2cmSPCqA9BCNHku9BdFqB3GbiCX:D1TousJSafd6imJd8EeBdF7biCX
                                                                                              MD5:4D784935677AE26ACDC3FB84FA1E6CF8
                                                                                              SHA1:4B143D26638C2BE44BE05D862E5CD1BEA3664825
                                                                                              SHA-256:C77E2D82DB9066E4DBFDE3AE0461A4259505F435EC0DB2CE3BD005BE0E2DE67C
                                                                                              SHA-512:193295AB3FBCE6BA4A563DD864839F5D7A3B8F351F576DE2C85E2F3978F3E33EF22299224DFD7D2F5506A2CAFB04656E19676F28B21F19C504B2D43921063554
                                                                                              Malicious:false
                                                                                              Preview: ..m.....%.8C......o`.M..d....mvW5].N ...c....m.b..1^J@....M.!.aq.f....<....._..;i.1-+.wZ..C@Z...> .P9.K..[~....1.......#.Djp...q..z..HoR/..8....k.......\.7..c..]_....._F.....3Z.9U........r..8..]..%n..Q..^<s`L{. ..9.o..wU33z...hJG..!..a.?mI...}.H}...o.Zs`.....~..x....".7.{....k.>. @X.\j........57..C..f.v...:..Q<.B.o..x..s}\.`....z..E@$.!.}}.&.VI........Y.....gU..b.b..l..Bg....bh.$.....f.B...e.f...a.....v.....9..x.#.......*[......=.T#.,.6.uN.........D.jdQ..go.T..+..N.U-.w.a..6 C.5.vMy....S...V...I..:..v2..V..................G..P K.{.&............o...q......`~.i8........+k.F...o.$TP....l.......;T..3.a.u.f..)...4b...-.r.&(<....'....n.[...b....k....W.Vp..G`..~..."k....Y../l3`....u_.L...#.....;....m.cV.|.:........#..P9;....Q..*F.._%.f..0...'.z.i..#;.X=.utJ...)9".......k..E..K...\..cc-..8<..f.T!{..c....S`4{....D2..s.....)`.h.;.QQ^mP.M77.'M.....q C).l....<..]QA.,...p......4..XQ.xu.w.z..g~.%M.....D...!.h.F.$~.....n%'.lt..E...h=......).?......N.K?.M.48..
                                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):57
                                                                                              Entropy (8bit):4.85263908467479
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                                                                                              MD5:A35128E4E28B27328F70E4E8FF482443
                                                                                              SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                                                                                              SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                                                                                              SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                                                                                              Malicious:false
                                                                                              Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              C:\Users\user\AppData\Roaming\kSLtgWcvnYChD.exe
                                                                                              Process:C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):1074176
                                                                                              Entropy (8bit):6.8072726854936185
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:7Sh4DXUMmnrfhufp9sdKxU2QwGjmMMs0t22BWLXdkeA:eSpAKWrwkm1y2+keA
                                                                                              MD5:35AC4AD018DC2BCDFAEFF01DECD3E8FE
                                                                                              SHA1:6DBE8E66F9E1C0F59169B7C7AFF0BCDB9C789ECC
                                                                                              SHA-256:9A74F71EE76B3652042A3F5E1F5E4A8BACC97A3C72B28BAA37008169170AB980
                                                                                              SHA-512:259B55AB84D7088D58C1E4C8C819FA84EF7591BFA9F4F16F21B5471EBB69BB984521447428E41F26A3E51CACC540C63BEC1F39B126461AF2270D1974BAD5C495
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0.............:.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...@.... ...................... ..`.rsrc...............................@..@.reloc...............b..............@..B........................H....... ....$......k...(...............................................".(.....*Vr...p.....r...p.....*..0..L.........}.....(.......(......(............s .....(!....o".....(#....o$.....(%....*.0..K.........}........(&........('.....,5...(............s .....(.....o".....(.....o$....8.....r...p.c...((...o)...tc.......(*..........9.....s.........s+...s,...o-.......o....(/.......o0...(1.......o2...(3.......o4...(5.......o6...(7.......o8...(9.........(:.....(......+....s+...s,...(
                                                                                              \Device\ConDrv
                                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):306
                                                                                              Entropy (8bit):4.969261552825097
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFdCsq2UTiMdH8stCal+n:zK1XnV30ZsGMIG9BFRbQdCT2UftCM+
                                                                                              MD5:F227448515085A647910907084E6728E
                                                                                              SHA1:5FA1A8E28B084DA25A1BBC51A2D75810CEF57E2C
                                                                                              SHA-256:662BA47D628FE8EBE95DD47B4482110A10B49AED09387BC0E028BB66E68E20BD
                                                                                              SHA-512:6F6E5DFFF7B17C304FB19B0BA5466AF84EF98A5C2EFA573AF72CFD3ED6964E9FD7F8E4B79FCFFBEF87CE545418C69D4984F4DD60BBF457D0A3640950F8FC5AF0
                                                                                              Malicious:false
                                                                                              Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                                              Static File Info

                                                                                              General

                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Entropy (8bit):6.8072726854936185
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                              File name:Orden n.#U00ba STL21119, pdf.exe
                                                                                              File size:1074176
                                                                                              MD5:35ac4ad018dc2bcdfaeff01decd3e8fe
                                                                                              SHA1:6dbe8e66f9e1c0f59169b7c7aff0bcdb9c789ecc
                                                                                              SHA256:9a74f71ee76b3652042a3f5e1f5e4a8bacc97a3c72b28baa37008169170ab980
                                                                                              SHA512:259b55ab84d7088d58c1e4c8c819fa84ef7591bfa9f4f16f21b5471ebb69bb984521447428e41f26a3e51cacc540c63bec1f39b126461af2270d1974bad5c495
                                                                                              SSDEEP:12288:7Sh4DXUMmnrfhufp9sdKxU2QwGjmMMs0t22BWLXdkeA:eSpAKWrwkm1y2+keA
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............0.............:.... ........@.. ....................................@................................

                                                                                              File Icon

                                                                                              Icon Hash:d4c6c4c8ccd4c0e4

                                                                                              Static PE Info

                                                                                              General

                                                                                              Entrypoint:0x4dc33a
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                              Time Stamp:0x6006B60A [Tue Jan 19 10:35:54 2021 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:v2.0.50727
                                                                                              OS Version Major:4
                                                                                              OS Version Minor:0
                                                                                              File Version Major:4
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:4
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                              Entrypoint Preview

                                                                                              Instruction
                                                                                              jmp dword ptr [00402000h]
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al
                                                                                              add byte ptr [eax], al

                                                                                              Data Directories

                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xdc2e80x4f.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x2bb88.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x10a0000xc.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                              Sections

                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x20000xda3400xda400False0.464727412658data7.08615591885IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0xde0000x2bb880x2bc00False0.145106026786data3.6125761847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0x10a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                              Resources

                                                                                              NameRVASizeTypeLanguageCountry
                                                                                              RT_ICON0xde2500x10828dBase III DBT, version number 0, next free block index 40
                                                                                              RT_ICON0xeea780x2ad0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                              RT_ICON0xf15480x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 3892081920, next used block 3187504384
                                                                                              RT_ICON0xf3af00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294866176, next used block 4294866176
                                                                                              RT_ICON0xf4b980x10828dBase III DBT, version number 0, next free block index 40
                                                                                              RT_ICON0x1053c00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 670987520, next used block 0
                                                                                              RT_GROUP_ICON0x1095e80x14data
                                                                                              RT_GROUP_ICON0x1095fc0x5adata
                                                                                              RT_VERSION0x1096580x342data
                                                                                              RT_MANIFEST0x10999c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                              Imports

                                                                                              DLLImport
                                                                                              mscoree.dll_CorExeMain

                                                                                              Version Infos

                                                                                              DescriptionData
                                                                                              Translation0x0000 0x04b0
                                                                                              LegalCopyrightCopyright Hewlett-Packard 2016
                                                                                              Assembly Version46.3.0.0
                                                                                              InternalName.exe
                                                                                              FileVersion46.3.0.0
                                                                                              CompanyNameHewlett-Packard
                                                                                              LegalTrademarks
                                                                                              Comments
                                                                                              ProductName
                                                                                              ProductVersion46.3.0.0
                                                                                              FileDescription
                                                                                              OriginalFilename.exe

                                                                                              Network Behavior

                                                                                              Network Port Distribution

                                                                                              TCP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 19, 2021 13:00:58.794450045 CET49702443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.826157093 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.826179028 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.826332092 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.827991009 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.828012943 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.828125000 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.828207016 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.831935883 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.831957102 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.832664967 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.838604927 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.838644028 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.838769913 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.838831902 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.839159012 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.839190006 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.839260101 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.839293957 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.842629910 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.845474958 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845504999 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845521927 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845537901 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845556974 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845575094 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845591068 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845607996 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845627069 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845642090 CET4434969892.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.845659971 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.845843077 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.845870018 CET49698443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.856807947 CET4434970292.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.856836081 CET4434970292.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.857081890 CET49702443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.887295008 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.887334108 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.887447119 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.887650967 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.887681007 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.887713909 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.887775898 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.888638973 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.888670921 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.888745070 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.888788939 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.889475107 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.889508963 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.889568090 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.889704943 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.890306950 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.890330076 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.890381098 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.890434027 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.891285896 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.891319990 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.891377926 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.891438961 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.892086983 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.892111063 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.892174959 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.892224073 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.892985106 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.893014908 CET4434970192.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.893075943 CET49701443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.913619995 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.913686991 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.913849115 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.913873911 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.915568113 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.915608883 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.916007042 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.919421911 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.919465065 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.919588089 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.919606924 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.923290968 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.923317909 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.924442053 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.927139044 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.927251101 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:58.994102955 CET4434970352.147.198.201192.168.2.7
                                                                                              Jan 19, 2021 13:00:58.994981050 CET49703443192.168.2.752.147.198.201
                                                                                              Jan 19, 2021 13:00:59.110119104 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:59.120718956 CET4434970352.147.198.201192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.120909929 CET49703443192.168.2.752.147.198.201
                                                                                              Jan 19, 2021 13:00:59.172729969 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.172759056 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.173068047 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:59.174572945 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.174597979 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.174858093 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:59.178553104 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.178591013 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.178956032 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:59.182414055 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.182557106 CET49697443192.168.2.792.122.145.220
                                                                                              Jan 19, 2021 13:00:59.184472084 CET4434969792.122.145.220192.168.2.7
                                                                                              Jan 19, 2021 13:00:59.184591055 CET49697443192.168.2.792.122.145.220

                                                                                              UDP Packets

                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 19, 2021 13:00:59.216551065 CET5464053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:00:59.278104067 CET53546408.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:03.000880003 CET5873953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:03.048883915 CET53587398.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:04.741123915 CET6033853192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:04.791841984 CET53603388.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:05.761414051 CET5871753192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:05.814177990 CET53587178.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:06.912892103 CET5976253192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:06.961415052 CET53597628.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:08.056766033 CET5432953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:08.104758978 CET53543298.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:09.079817057 CET5805253192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:09.138430119 CET53580528.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:10.165616035 CET5400853192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:10.213527918 CET53540088.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:11.812091112 CET5945153192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:11.859911919 CET53594518.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:12.977188110 CET5291453192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:13.025719881 CET53529148.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:14.030255079 CET6456953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:14.081110001 CET53645698.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:15.391658068 CET5281653192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:15.448194981 CET53528168.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:16.477684021 CET5078153192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:16.525547981 CET53507818.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:20.885052919 CET5423053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:20.945959091 CET53542308.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:22.778745890 CET5491153192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:22.840121031 CET53549118.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:26.313744068 CET4995853192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:26.361865997 CET53499588.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:31.787610054 CET5086053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:31.836179018 CET53508608.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:43.130891085 CET5045253192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:43.181907892 CET53504528.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:44.289680958 CET5973053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:44.340419054 CET53597308.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:45.511645079 CET5931053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:45.559434891 CET53593108.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:48.328197956 CET5191953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:48.378981113 CET53519198.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:01:49.379774094 CET6429653192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:01:49.439013958 CET53642968.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:01.919405937 CET5668053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:01.977049112 CET53566808.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:06.905705929 CET5882053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:06.956756115 CET53588208.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:07.877549887 CET6098353192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:07.933974981 CET53609838.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:09.136959076 CET4924753192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:09.193193913 CET53492478.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:10.278424025 CET5228653192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:10.326281071 CET53522868.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:10.426754951 CET5606453192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:10.500736952 CET53560648.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:11.218262911 CET6374453192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:11.266000986 CET53637448.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:13.043951988 CET6145753192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:13.103302956 CET53614578.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:14.437928915 CET5836753192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:14.488084078 CET53583678.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:15.462379932 CET6059953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:15.510675907 CET53605998.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:17.396972895 CET5957153192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:17.453497887 CET53595718.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:19.650741100 CET5268953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:19.706891060 CET53526898.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:20.599031925 CET5029053192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:20.656295061 CET53502908.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:36.772881031 CET6042753192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:36.829235077 CET53604278.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:02:52.913959026 CET5620953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:02:52.965224028 CET53562098.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:03:12.404690027 CET5958253192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:03:12.463337898 CET53595828.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:03:29.861680984 CET6094953192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:03:29.917964935 CET53609498.8.8.8192.168.2.7
                                                                                              Jan 19, 2021 13:03:47.478713036 CET5854253192.168.2.78.8.8.8
                                                                                              Jan 19, 2021 13:03:47.538125038 CET53585428.8.8.8192.168.2.7

                                                                                              DNS Queries

                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                              Jan 19, 2021 13:01:20.885052919 CET192.168.2.78.8.8.80x4abdStandard query (0)graceland777.ddns.netA (IP address)IN (0x0001)
                                                                                              Jan 19, 2021 13:03:12.404690027 CET192.168.2.78.8.8.80xc958Standard query (0)graceland777.ddns.netA (IP address)IN (0x0001)
                                                                                              Jan 19, 2021 13:03:29.861680984 CET192.168.2.78.8.8.80x7333Standard query (0)graceland777.ddns.netA (IP address)IN (0x0001)
                                                                                              Jan 19, 2021 13:03:47.478713036 CET192.168.2.78.8.8.80xfa40Standard query (0)graceland777.ddns.netA (IP address)IN (0x0001)

                                                                                              DNS Answers

                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                              Jan 19, 2021 13:01:20.945959091 CET8.8.8.8192.168.2.70x4abdNo error (0)graceland777.ddns.net185.140.53.129A (IP address)IN (0x0001)
                                                                                              Jan 19, 2021 13:03:12.463337898 CET8.8.8.8192.168.2.70xc958No error (0)graceland777.ddns.net185.140.53.129A (IP address)IN (0x0001)
                                                                                              Jan 19, 2021 13:03:29.917964935 CET8.8.8.8192.168.2.70x7333No error (0)graceland777.ddns.net185.140.53.129A (IP address)IN (0x0001)
                                                                                              Jan 19, 2021 13:03:47.538125038 CET8.8.8.8192.168.2.70xfa40No error (0)graceland777.ddns.net185.140.53.129A (IP address)IN (0x0001)

                                                                                              Code Manipulations

                                                                                              Statistics

                                                                                              Behavior

                                                                                              Click to jump to process

                                                                                              System Behavior

                                                                                              General

                                                                                              Start time:13:01:04
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Users\user\Desktop\Orden n.#U00ba STL21119, pdf.exe'
                                                                                              Imagebase:0x7fffae0c0000
                                                                                              File size:1074176 bytes
                                                                                              MD5 hash:35AC4AD018DC2BCDFAEFF01DECD3E8FE
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Yara matches:
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.253789558.0000000003B41000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.251685714.0000000002B8B000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, Author: Joe Security
                                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.254170099.0000000003C38000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                              Reputation:low

                                                                                              General

                                                                                              Start time:13:01:12
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\kSLtgWcvnYChD' /XML 'C:\Users\user\AppData\Local\Temp\tmp40AA.tmp'
                                                                                              Imagebase:0x260000
                                                                                              File size:185856 bytes
                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:13
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff774ee0000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:14
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:{path}
                                                                                              Imagebase:0x700000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:13:01:15
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpD3F6.tmp'
                                                                                              Imagebase:0x260000
                                                                                              File size:185856 bytes
                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:16
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff774ee0000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:16
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpD714.tmp'
                                                                                              Imagebase:0x260000
                                                                                              File size:185856 bytes
                                                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:16
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff774ee0000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:18
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                                                                                              Imagebase:0x3b0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:13:01:18
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff774ee0000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:18
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                              Imagebase:0x1f0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Antivirus matches:
                                                                                              • Detection: 0%, Metadefender, Browse
                                                                                              • Detection: 0%, ReversingLabs
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:13:01:19
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff774ee0000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              General

                                                                                              Start time:13:01:25
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                              Imagebase:0xcd0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:.Net C# or VB.NET
                                                                                              Reputation:moderate

                                                                                              General

                                                                                              Start time:13:01:25
                                                                                              Start date:19/01/2021
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff774ee0000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Disassembly

                                                                                              Code Analysis

                                                                                              Reset < >