Loading ...

Play interactive tourEdit tour

Analysis Report JMG Memo-Circular No 018-21.PDF.exe

Overview

General Information

Sample Name:JMG Memo-Circular No 018-21.PDF.exe
Analysis ID:356480
MD5:f12d78ae2ce77b187e98b382bc400e6e
SHA1:a4a09f0297221e8e3d8f510f139a10b30b9bb7e8
SHA256:019dce879f64d1a5a23de8ae1d0eac08200954b26665232507187e7f524b4f24
Tags:exeNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • JMG Memo-Circular No 018-21.PDF.exe (PID: 3540 cmdline: 'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe' MD5: F12D78AE2CE77B187E98B382BC400E6E)
    • schtasks.exe (PID: 6568 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • JMG Memo-Circular No 018-21.PDF.exe (PID: 6628 cmdline: {path} MD5: F12D78AE2CE77B187E98B382BC400E6E)
      • schtasks.exe (PID: 6864 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC90F.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • JMG Memo-Circular No 018-21.PDF.exe (PID: 7000 cmdline: 'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe' 0 MD5: F12D78AE2CE77B187E98B382BC400E6E)
    • schtasks.exe (PID: 5660 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp8F7C.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c4cca249-81f6-4232-9f14-01569e09f5f0", "Group": "JANUARY", "Domain1": "shahzad73.casacam.net", "Domain2": "shahzad73.ddns.net", "Port": 9036, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x59eb:$x1: NanoCore.ClientPluginHost
  • 0x5b48:$x2: IClientNetworkHost
00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x59eb:$x2: NanoCore.ClientPluginHost
  • 0x6941:$s3: PipeExists
  • 0x5be1:$s4: PipeCreated
  • 0x5a05:$s5: IClientLoggingHost
00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x4bbb:$x1: NanoCore.ClientPluginHost
  • 0x4be5:$x2: IClientNetworkHost
00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x4bbb:$x2: NanoCore.ClientPluginHost
  • 0x6a6b:$s4: PipeCreated
00000007.00000002.501098807.0000000006E10000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
Click to see the 55 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x39eb:$x1: NanoCore.ClientPluginHost
  • 0x3a24:$x2: IClientNetworkHost
7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x39eb:$x2: NanoCore.ClientPluginHost
  • 0x3b36:$s4: PipeCreated
  • 0x3a05:$s5: IClientLoggingHost
7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x170b:$x1: NanoCore.ClientPluginHost
  • 0x1725:$x2: IClientNetworkHost
7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x170b:$x2: NanoCore.ClientPluginHost
  • 0x34b6:$s4: PipeCreated
  • 0x16f8:$s5: IClientLoggingHost
7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x41ee:$x1: NanoCore.ClientPluginHost
  • 0x422b:$x2: IClientNetworkHost
Click to see the 157 entries

Sigma Overview

System Summary:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe, ProcessId: 6628, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
Sigma detected: Scheduled temp file as task from temp locationShow sources
Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe' , ParentImage: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe, ParentProcessId: 3540, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp', ProcessId: 6568
Sigma detected: Suspicious Double ExtensionShow sources
Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: {path}, CommandLine: {path}, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe, NewProcessName: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe, OriginalFileName: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe, ParentCommandLine: 'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe' , ParentImage: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe, ParentProcessId: 3540, ProcessCommandLine: {path}, ProcessId: 6628

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Found malware configurationShow sources
Source: 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c4cca249-81f6-4232-9f14-01569e09f5f0", "Group": "JANUARY", "Domain1": "shahzad73.casacam.net", "Domain2": "shahzad73.ddns.net", "Port": 9036, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\GmaLrlDR.exeReversingLabs: Detection: 12%
Multi AV Scanner detection for submitted fileShow sources
Source: JMG Memo-Circular No 018-21.PDF.exeReversingLabs: Detection: 12%
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.492154123.0000000002B91000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORY
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPE
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpackAvira: Label: TR/NanoCore.fadte
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpackAvira: Label: TR/NanoCore.fadte

Compliance:

barindex
Uses 32bit PE filesShow sources
Source: JMG Memo-Circular No 018-21.PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: JMG Memo-Circular No 018-21.PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbolsShow sources
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49718 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49719 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49720 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49722 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49727 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49728 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49734 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49735 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49736 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49737 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49739 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49740 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49741 -> 91.212.153.84:9036
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49742 -> 91.212.153.84:9036
C2 URLs / IPs found in malware configurationShow sources
Source: Malware configuration extractorURLs: shahzad73.ddns.net
Source: Malware configuration extractorURLs: shahzad73.casacam.net
Source: global trafficTCP traffic: 192.168.2.5:49718 -> 91.212.153.84:9036
Source: Joe Sandbox ViewIP Address: 91.212.153.84 91.212.153.84
Source: Joe Sandbox ViewASN Name: MYLOC-ASIPBackboneofmyLocmanagedITAGDE MYLOC-ASIPBackboneofmyLocmanagedITAGDE
Source: unknownDNS traffic detected: queries for: shahzad73.casacam.net
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://code.google.com/feeds/p/topicalmemorysystem/downloads/basic.xml
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://code.google.com/p/topicalmemorysystem/
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmpString found in binary or memory: http://google.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.278347739.00000000031C1000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.349609477.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://topicalmemorysystem.googlecode.com/files/
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://www.biblegateway.com/passage/?search=
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://www.biblija.net/biblija.cgi?m=
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://www.blueletterbible.org/Bible.cfm?b=
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232454691.000000000628D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232454691.000000000628D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comB
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://www.esvstudybible.org/search?q=
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: http://www.esvstudybible.org/search?q=Whttp://www.blueletterbible.org/Bible.cfm?b=
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227574315.0000000006288000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227574315.0000000006288000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn(
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227574315.0000000006288000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnB
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232848694.000000000628D000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232837315.0000000006285000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.B
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.233327903.000000000628B000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.l
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.225859456.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coma
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.225859456.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.come
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.225859456.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coms-e
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227665199.0000000006288000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comq
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.278139983.000000000169B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

E-Banking Fraud:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.492154123.0000000002B91000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORY
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPE

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.501098807.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.496807047.0000000003E81000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.500985326.0000000006DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.501114313.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.500970500.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.500950111.0000000006DA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.500819703.0000000006BF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.501154629.0000000006E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.501030742.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.500935667.0000000006D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.501047468.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000007.00000002.497599353.0000000005170000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6d90000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b99930.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e20000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6da0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6bf0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b99930.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dd0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e2e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ee65ee.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e10000.33.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5380000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6df0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.31b9718.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2bbcab0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c43f90.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c43f90.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b9e5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e24c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e10000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6bf0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6df0000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6da0000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ee65ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dd0000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6db0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5170000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e20000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dc0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5380000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dc0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ba81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Initial sample is a PE file and has a suspicious nameShow sources
Source: initial sampleStatic PE information: Filename: JMG Memo-Circular No 018-21.PDF.exe
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_0307D20C
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_0307F2C0
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_0307F2D0
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_097A6010
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_097A7948
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_097A0040
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_097A0012
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_097A1D7D
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_06E73898
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_06E642EB
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_06E646D3
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_06E63324
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_02A4E480
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_02A4E471
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_02A4BBD4
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013CD20C
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013CF2D0
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013CF2C3
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_07396010
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_07391D7D
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_07397948
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_07390007
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_07390040
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_0182E480
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_0182E471
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_0182BBD4
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_05733E30
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_05734A50
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_05734B08
Source: JMG Memo-Circular No 018-21.PDF.exeBinary or memory string: OriginalFilename vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmpBinary or memory string: OriginalFilename5o& vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.278139983.000000000169B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.290102585.0000000009710000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.289718051.00000000091B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.290225202.0000000009770000.00000002.00000001.sdmpBinary or memory string: originalfilename vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.290225202.0000000009770000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exeBinary or memory string: OriginalFilename vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496807047.0000000003E81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496807047.0000000003E81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496807047.0000000003E81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.488524867.0000000000712000.00000002.00020000.sdmpBinary or memory string: OriginalFilename5o& vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.497526410.0000000005130000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501255794.0000000007080000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exeBinary or memory string: OriginalFilename vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.358012947.0000000006EF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.347449069.0000000000872000.00000002.00020000.sdmpBinary or memory string: OriginalFilename5o& vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.359947823.0000000008DC0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exeBinary or memory string: OriginalFilename vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.365392863.0000000000D62000.00000002.00020000.sdmpBinary or memory string: OriginalFilename5o& vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.367544946.00000000056F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exeBinary or memory string: OriginalFilename5o& vs JMG Memo-Circular No 018-21.PDF.exe
Source: JMG Memo-Circular No 018-21.PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.501098807.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.501098807.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.496807047.0000000003E81000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.500985326.0000000006DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.500985326.0000000006DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.501114313.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.501114313.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.500970500.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.500970500.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.500950111.0000000006DA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.500950111.0000000006DA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.500819703.0000000006BF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.500819703.0000000006BF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.501154629.0000000006E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.501154629.0000000006E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.501030742.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.501030742.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.500935667.0000000006D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.500935667.0000000006D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.501047468.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.501047468.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000007.00000002.497599353.0000000005170000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000007.00000002.497599353.0000000005170000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6d90000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6d90000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b99930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b99930.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e20000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e20000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6da0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6da0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6bf0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6bf0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b99930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b99930.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ef4a1e.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dd0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dd0000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e2e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e2e8a4.36.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ee65ee.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ee65ee.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e10000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e10000.33.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5380000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5380000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6df0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6df0000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.31b9718.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.31b9718.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2bbcab0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2bbcab0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c43f90.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c43f90.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c43f90.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b9e5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3b9e5cf.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e24c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e24c9f.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e10000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e10000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6bf0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6bf0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6df0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6df0000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3edd7bf.16.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6da0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6da0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ee65ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ee65ee.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dd0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dd0000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6db0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6db0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e60000.37.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5170000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5170000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e20000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6e20000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dc0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dc0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6de0000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c185a8.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5380000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5380000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dc0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.6dc0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.2c2f920.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ba81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3ba81d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
Source: classification engineClassification label: mal100.troj.evad.winEXE@15/10@15/2
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile created: C:\Users\user\AppData\Roaming\GmaLrlDR.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6576:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6888:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5716:120:WilError_01
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeMutant created: \Sessions\1\BaseNamedObjects\QeEchgPSOU
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c4cca249-81f6-4232-9f14-01569e09f5f0}
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1B75.tmpJump to behavior
Source: JMG Memo-Circular No 018-21.PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: JMG Memo-Circular No 018-21.PDF.exeReversingLabs: Detection: 12%
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile read: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe 'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe'
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe {path}
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC90F.tmp'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe 'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe' 0
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp8F7C.tmp'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe {path}
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe {path}
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC90F.tmp'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp8F7C.tmp'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe {path}
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: JMG Memo-Circular No 018-21.PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: JMG Memo-Circular No 018-21.PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp
Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp
Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp

Data Obfuscation:

barindex
.NET source code contains potential unpackerShow sources
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 0_2_09AE3DB7 push FFFFFF8Bh; iretd
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C4121 push ecx; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C4123 push ecx; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C41E1 push esp; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C41E3 push esp; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C42D7 push edi; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C42D3 push esi; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C4513 push edi; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C4491 push edi; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_013C4493 push edi; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_05351598 push eax; mov dword ptr [esp], ecx
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_07183DD5 push FFFFFF8Bh; iretd
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_071811B8 push cs; ret
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 13_2_073999E3 push 8BF08B66h; retf
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 19_2_05736E5D push FFFFFF8Bh; iretd
Source: initial sampleStatic PE information: section name: .text entropy: 6.85708013981
Source: initial sampleStatic PE information: section name: .text entropy: 6.85708013981
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
Source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile created: C:\Users\user\AppData\Roaming\GmaLrlDR.exeJump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp'

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile opened: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe:Zone.Identifier read attributes | delete
Uses an obfuscated file name to hide its real file extension (double extension)Show sources
Source: Possible double extension: pdf.exeStatic PE information: JMG Memo-Circular No 018-21.PDF.exe
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeThread delayed: delay time: 922337203685477
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWindow / User API: threadDelayed 7797
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWindow / User API: threadDelayed 1288
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWindow / User API: foregroundWindowGot 588
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWindow / User API: foregroundWindowGot 687
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe TID: 3060Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe TID: 6716Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe TID: 7040Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe TID: 7108Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe TID: 6428Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe TID: 6444Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501255794.0000000007080000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501255794.0000000007080000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501255794.0000000007080000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501255794.0000000007080000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeMemory written: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeMemory written: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe base: 400000 value starts with: 4D5A
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe {path}
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC90F.tmp'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp8F7C.tmp'
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeProcess created: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe {path}
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.493176991.0000000002D05000.00000004.00000001.sdmpBinary or memory string: Program Manager
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.491171992.0000000001410000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.491171992.0000000001410000.00000002.00000001.sdmpBinary or memory string: Progman
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.491171992.0000000001410000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501419232.00000000073EB000.00000004.00000001.sdmpBinary or memory string: Program Managerram Manager
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: Program Managerx
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.491171992.0000000001410000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.491171992.0000000001410000.00000002.00000001.sdmpBinary or memory string: Progmanlock
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpBinary or memory string: Program Managert
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.501553444.0000000007BAB000.00000004.00000001.sdmpBinary or memory string: Program Manager 8
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeCode function: 7_2_06E730B0 GetSystemTimes,
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.492154123.0000000002B91000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORY
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPE

Remote Access Functionality:

barindex
Detected Nanocore RatShow sources
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: JMG Memo-Circular No 018-21.PDF.exeString found in binary or memory: NanoCore.ClientPluginHost
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: JMG Memo-Circular No 018-21.PDF.exe, 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000007.00000002.492154123.0000000002B91000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 3540, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6376, type: MEMORY
Source: Yara matchFile source: Process Memory Space: JMG Memo-Circular No 018-21.PDF.exe PID: 6628, type: MEMORY
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a4c4d.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 13.2.JMG Memo-Circular No 018-21.PDF.exe.3f33400.1.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3be4c4d.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.41a0624.4.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.5234629.21.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.4283400.2.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3bfdc41.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 19.2.JMG Memo-Circular No 018-21.PDF.exe.419b7ee.5.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3da57cc.14.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db3bfa.12.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 7.2.JMG Memo-Circular No 018-21.PDF.exe.3db8a30.13.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.JMG Memo-Circular No 018-21.PDF.exe.42b6020.1.raw.unpack, type: UNPACKEDPE

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection112Masquerading11Input Capture21System Time Discovery1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerSecurity Software Discovery121SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion3Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information12DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemSystem Information Discovery13Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 356480 Sample: JMG Memo-Circular No 018-21... Startdate: 23/02/2021 Architecture: WINDOWS Score: 100 47 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 12 other signatures 2->53 8 JMG Memo-Circular No 018-21.PDF.exe 6 2->8         started        12 JMG Memo-Circular No 018-21.PDF.exe 4 2->12         started        process3 file4 33 C:\Users\user\AppData\RoamingbehaviorgraphmaLrlDR.exe, PE32 8->33 dropped 35 C:\Users\user\AppData\Local\...\tmp1B75.tmp, XML 8->35 dropped 37 JMG Memo-Circular No 018-21.PDF.exe.log, ASCII 8->37 dropped 55 Injects a PE file into a foreign processes 8->55 14 JMG Memo-Circular No 018-21.PDF.exe 11 8->14         started        19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 12->21         started        23 JMG Memo-Circular No 018-21.PDF.exe 2 12->23         started        signatures5 process6 dnsIp7 41 shahzad73.casacam.net 91.212.153.84, 49718, 49719, 49720 MYLOC-ASIPBackboneofmyLocmanagedITAGDE unknown 14->41 43 192.168.2.1 unknown unknown 14->43 39 C:\Users\user\AppData\Roaming\...\run.dat, data 14->39 dropped 45 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->45 25 schtasks.exe 1 14->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        file8 signatures9 process10 process11 31 conhost.exe 25->31         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
JMG Memo-Circular No 018-21.PDF.exe12%ReversingLabsByteCode-MSIL.Trojan.Pwsx

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\GmaLrlDR.exe12%ReversingLabsByteCode-MSIL.Trojan.Pwsx

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
7.2.JMG Memo-Circular No 018-21.PDF.exe.5230000.20.unpack100%AviraTR/NanoCore.fadteDownload File
13.2.JMG Memo-Circular No 018-21.PDF.exe.43de1b8.2.unpack100%AviraHEUR/AGEN.1110362Download File
7.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
19.2.JMG Memo-Circular No 018-21.PDF.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
7.2.JMG Memo-Circular No 018-21.PDF.exe.3bf9618.11.unpack100%AviraTR/NanoCore.fadteDownload File
0.2.JMG Memo-Circular No 018-21.PDF.exe.472e1b8.3.unpack100%AviraHEUR/AGEN.1110362Download File

Domains

SourceDetectionScannerLabelLink
shahzad73.casacam.net5%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
shahzad73.ddns.net1%VirustotalBrowse
shahzad73.ddns.net0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.tiro.comq0%Avira URL Cloudsafe
http://www.esvstudybible.org/search?q=0%Avira URL Cloudsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.tiro.com0%URL Reputationsafe
http://www.esvstudybible.org/search?q=Whttp://www.blueletterbible.org/Bible.cfm?b=0%Avira URL Cloudsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.carterandcone.com0%URL Reputationsafe
http://www.carterandcone.com0%URL Reputationsafe
http://www.carterandcone.com0%URL Reputationsafe
http://topicalmemorysystem.googlecode.com/files/0%Avira URL Cloudsafe
http://www.founder.com.cn/cnB0%Avira URL Cloudsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.carterandcone.comB0%Avira URL Cloudsafe
http://www.typography.netD0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.monotype.0%URL Reputationsafe
http://www.monotype.0%URL Reputationsafe
http://www.monotype.0%URL Reputationsafe
http://www.monotype.l0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.monotype.B0%Avira URL Cloudsafe
http://www.sajatypeworks.coma0%URL Reputationsafe
http://www.sajatypeworks.coma0%URL Reputationsafe
http://www.sajatypeworks.coma0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.sajatypeworks.come0%URL Reputationsafe
http://www.sajatypeworks.come0%URL Reputationsafe
http://www.sajatypeworks.come0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.founder.com.cn/cn(0%Avira URL Cloudsafe
http://www.sajatypeworks.coms-e0%Avira URL Cloudsafe
shahzad73.casacam.net0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
shahzad73.casacam.net
91.212.153.84
truetrueunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
shahzad73.ddns.nettrue
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
shahzad73.casacam.nettrue
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.apache.org/licenses/LICENSE-2.0JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
    high
    http://www.fontbureau.comJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
      high
      http://www.fontbureau.com/designersGJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
        high
        http://www.fontbureau.com/designers/?JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
          high
          http://www.founder.com.cn/cn/bTheJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers?JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
            high
            http://www.biblegateway.com/passage/?search=JMG Memo-Circular No 018-21.PDF.exefalse
              high
              http://www.tiro.comqJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227665199.0000000006288000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.esvstudybible.org/search?q=JMG Memo-Circular No 018-21.PDF.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.tiro.comJMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.esvstudybible.org/search?q=Whttp://www.blueletterbible.org/Bible.cfm?b=JMG Memo-Circular No 018-21.PDF.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersJMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                high
                http://www.goodfont.co.krJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232454691.000000000628D000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://topicalmemorysystem.googlecode.com/files/JMG Memo-Circular No 018-21.PDF.exefalse
                • Avira URL Cloud: safe
                unknown
                http://www.biblija.net/biblija.cgi?m=JMG Memo-Circular No 018-21.PDF.exefalse
                  high
                  http://www.founder.com.cn/cnBJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227574315.0000000006288000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.carterandcone.comlJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.carterandcone.comBJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232454691.000000000628D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.typography.netDJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/cTheJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.comJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227574315.0000000006288000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-jones.htmlJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                      high
                      http://www.monotype.JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232848694.000000000628D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.monotype.lJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.233327903.000000000628B000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.blueletterbible.org/Bible.cfm?b=JMG Memo-Circular No 018-21.PDF.exefalse
                        high
                        http://www.jiyu-kobo.co.jp/JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                          high
                          http://www.fonts.comJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.krJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.monotype.BJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.232837315.0000000006285000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.comaJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.225859456.000000000629B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.278347739.00000000031C1000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.349609477.0000000002E71000.00000004.00000001.sdmpfalse
                              high
                              http://www.sajatypeworks.comeJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.225859456.000000000629B000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000002.286703897.0000000007492000.00000004.00000001.sdmp, JMG Memo-Circular No 018-21.PDF.exe, 0000000D.00000002.357332280.0000000005DF0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn(JMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.227574315.0000000006288000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.sajatypeworks.coms-eJMG Memo-Circular No 018-21.PDF.exe, 00000000.00000003.225859456.000000000629B000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              91.212.153.84
                              unknownunknown
                              24961MYLOC-ASIPBackboneofmyLocmanagedITAGDEtrue

                              Private

                              IP
                              192.168.2.1

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:356480
                              Start date:23.02.2021
                              Start time:08:39:03
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 12m 51s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:JMG Memo-Circular No 018-21.PDF.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:29
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@15/10@15/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 0% (good quality ratio 0%)
                              • Quality average: 100%
                              • Quality standard deviation: 0%
                              HCA Information:
                              • Successful, ratio: 91%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • TCP Packets have been reduced to 100
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 52.147.198.201, 131.253.33.200, 13.107.22.200, 13.64.90.137, 92.122.145.220, 40.88.32.150, 13.88.21.125, 52.255.188.83, 23.218.208.56, 51.103.5.159, 2.20.142.209, 2.20.142.210, 51.104.139.180, 92.122.213.194, 92.122.213.247, 51.11.168.160, 20.54.26.129
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, wns.notify.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              08:39:59API Interceptor767x Sleep call for process: JMG Memo-Circular No 018-21.PDF.exe modified
                              08:40:20Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe" s>$(Arg0)

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              91.212.153.84LIST OF DELISTED AGENCIES 22ND FEB 2021.PDF.exeGet hashmaliciousBrowse
                                POEA ADVISORY ON DELISTED AGENCIES.PDF.exeGet hashmaliciousBrowse
                                  Swift copy_BILLING INVOICE.pdf.exeGet hashmaliciousBrowse
                                    POEA ADVISORY ON DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                      POEA ADVISORY NO 450 2021.pdf.exeGet hashmaliciousBrowse
                                        POEA DELISTED AGENCIES (BATCH A).PDF.exeGet hashmaliciousBrowse
                                          POEA MEMORANDUM N0 056.exeGet hashmaliciousBrowse
                                            Protected.exeGet hashmaliciousBrowse
                                              Protected.2.exeGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                shahzad73.casacam.netLIST OF DELISTED AGENCIES 22ND FEB 2021.PDF.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA ADVISORY ON DELISTED AGENCIES.PDF.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                Swift copy_BILLING INVOICE.pdf.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA ADVISORY ON DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA ADVISORY NO 450 2021.pdf.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA DELISTED AGENCIES (BATCH A).PDF.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA MEMORANDUM N0 056.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                Protected.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                Protected.2.exeGet hashmaliciousBrowse
                                                • 91.212.153.84

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                MYLOC-ASIPBackboneofmyLocmanagedITAGDELIST OF DELISTED AGENCIES 22ND FEB 2021.PDF.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA ADVISORY ON DELISTED AGENCIES.PDF.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                Swift copy_BILLING INVOICE.pdf.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA ADVISORY ON DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA ADVISORY NO 450 2021.pdf.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA DELISTED AGENCIES (BATCH A).PDF.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                POEA MEMORANDUM N0 056.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                Swift_Payment_jpeg.exeGet hashmaliciousBrowse
                                                • 62.141.37.17
                                                Protected.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                Protected.2.exeGet hashmaliciousBrowse
                                                • 91.212.153.84
                                                FickerStealer.exeGet hashmaliciousBrowse
                                                • 89.163.225.172
                                                Documentaci#U00f3n.docGet hashmaliciousBrowse
                                                • 89.163.210.141
                                                SecuriteInfo.com.Trojan.DownLoader36.34557.26355.exeGet hashmaliciousBrowse
                                                • 89.163.140.102
                                                TaskAudio Driver.exeGet hashmaliciousBrowse
                                                • 193.111.198.220
                                                Z8363664.docGet hashmaliciousBrowse
                                                • 89.163.210.141
                                                OhGodAnETHlargementPill2.exeGet hashmaliciousBrowse
                                                • 193.111.198.220
                                                godflex-r2.exeGet hashmaliciousBrowse
                                                • 193.111.198.220
                                                PolarisBiosEditor-master.exeGet hashmaliciousBrowse
                                                • 193.111.198.220
                                                NKsplucdAu.exeGet hashmaliciousBrowse
                                                • 85.114.134.88
                                                lZVNh1BPxm.exeGet hashmaliciousBrowse
                                                • 85.114.134.88

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JMG Memo-Circular No 018-21.PDF.exe.log
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.355304211458859
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                C:\Users\user\AppData\Local\Temp\tmp1B75.tmp
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1645
                                                Entropy (8bit):5.16503394644957
                                                Encrypted:false
                                                SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBqtn:cbhC7ZlNQF/rydbz9I3YODOLNdq32
                                                MD5:E8925C09B9BB23D063EE91146E77209B
                                                SHA1:1072F71BEF66C046ADCC8E9AA7E80660FCF666AA
                                                SHA-256:4D2ED0F58CA386198F355B70090AB55CB43F4C09FFAFC188A2CBB9B08B5D50AD
                                                SHA-512:BA1E7B1C9EEF7D2EBF63F797AB7217EE63C59B6C6A4B994A331546D291ACAEB05FA3AB277E901D15C76C41EC08800200C3B2D9838C532E805B284DAA4B74FFF4
                                                Malicious:true
                                                Reputation:low
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                C:\Users\user\AppData\Local\Temp\tmp8F7C.tmp
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1645
                                                Entropy (8bit):5.16503394644957
                                                Encrypted:false
                                                SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBqtn:cbhC7ZlNQF/rydbz9I3YODOLNdq32
                                                MD5:E8925C09B9BB23D063EE91146E77209B
                                                SHA1:1072F71BEF66C046ADCC8E9AA7E80660FCF666AA
                                                SHA-256:4D2ED0F58CA386198F355B70090AB55CB43F4C09FFAFC188A2CBB9B08B5D50AD
                                                SHA-512:BA1E7B1C9EEF7D2EBF63F797AB7217EE63C59B6C6A4B994A331546D291ACAEB05FA3AB277E901D15C76C41EC08800200C3B2D9838C532E805B284DAA4B74FFF4
                                                Malicious:false
                                                Reputation:low
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                C:\Users\user\AppData\Local\Temp\tmpC90F.tmp
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1322
                                                Entropy (8bit):5.130714996587634
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0PQxtn:cbk4oL600QydbQxIYODOLedq3SQj
                                                MD5:873118250D15609893AB07964F3B2366
                                                SHA1:87F00CD5D4F91128D2FE6ED69EFCABB87E6EDBAD
                                                SHA-256:43C45CFCBC19B8127ED719C7532FA1C677D2120C03755A04207E3ADE43F8BE88
                                                SHA-512:C9EE4356E5F62F4DFA0ABBD4BFEF76107073286E54312332BC19E92CAFC87F347DAC04D5C636C3CEDA1F315EC3D07BD291DC934259583A2686E1E786552DAF58
                                                Malicious:false
                                                Reputation:low
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1856
                                                Entropy (8bit):7.089541637477408
                                                Encrypted:false
                                                SSDEEP:48:IknjhUknjhUknjhUknjhUknjhUknjhUknjhUknjhL:HjhDjhDjhDjhDjhDjhDjhDjhL
                                                MD5:30D23CC577A89146961915B57F408623
                                                SHA1:9B5709D6081D8E0A570511E6E0AAE96FA041964F
                                                SHA-256:E2130A72E55193D402B5F43F7F3584ECF6B423F8EC4B1B1B69AD693C7E0E5A9E
                                                SHA-512:2D5C5747FD04F8326C2CC1FB313925070BC01D3352AFA6C36C167B72757A15F58B6263D96BD606338DA055812E69DDB628A6E18D64DD59697C2F42D1C58CC687
                                                Malicious:false
                                                Reputation:low
                                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):2.75
                                                Encrypted:false
                                                SSDEEP:3:A9P:4
                                                MD5:3D84C57B91B521E65FDEE4541F112EC0
                                                SHA1:0D127DDC6EB4167551A63D3C27198E3FF1512618
                                                SHA-256:5EAE71E53B82FDBAC607F1E98BADC83B896C7615B72D1E47FA5A5518B5D2E760
                                                SHA-512:353A83E5354F540C99D379A015C0089B50E673869A8E395C291C21868F749AB1E1B9ED283B07500247B1DC054FD7DF0C87BA8AEF4E4AF37F77A7BA518BE71FFE
                                                Malicious:true
                                                Preview: ......H
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):40
                                                Entropy (8bit):5.153055907333276
                                                Encrypted:false
                                                SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                MD5:4E5E92E2369688041CC82EF9650EDED2
                                                SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                Malicious:false
                                                Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):327768
                                                Entropy (8bit):7.999367066417797
                                                Encrypted:true
                                                SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                                                MD5:2E52F446105FBF828E63CF808B721F9C
                                                SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                                                SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                                                SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                                                Malicious:false
                                                Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):59
                                                Entropy (8bit):4.846720753111607
                                                Encrypted:false
                                                SSDEEP:3:oNUWJRWv69XiKA16A:oNNJAupA0A
                                                MD5:255273167AB1F8F99E97AD1AD0A47F10
                                                SHA1:24C23E0E0627C103CA6FEF02EF506960494C4085
                                                SHA-256:7ED75483CB10B524E172E8DBE810B5F9871AF1DE0E1379076916E04367D9233C
                                                SHA-512:82817A6D63AE5247CB865723660381A9A63C05831E8EB564075134F19F0D3E2377D792A49A23C74CB18794B5305B137732E0D56E8FBD3F8834A7FE810BF6F389
                                                Malicious:false
                                                Preview: C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                C:\Users\user\AppData\Roaming\GmaLrlDR.exe
                                                Process:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):714240
                                                Entropy (8bit):6.848207378321331
                                                Encrypted:false
                                                SSDEEP:12288:/GTEIGBl1jcqvSq5HGO9rHCrnaRsGFPY6:/4GJoGb586sGW
                                                MD5:F12D78AE2CE77B187E98B382BC400E6E
                                                SHA1:A4A09F0297221E8E3D8F510F139A10B30B9BB7E8
                                                SHA-256:019DCE879F64D1A5A23DE8AE1D0EAC08200954B26665232507187E7F524B4F24
                                                SHA-512:579431D0548682078764625D5557CA247371AD661483067A0A6F167DD2BBCC6597BF1EB38D1E6C1442FBA0C5FE4166B23EE088716669EE023ED40FD2D74D12FB
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 12%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n4`..............0.................. ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......,[..t............C.. ..............................................}.....(.......(......{....r...p~/...(....o......{....o....&*..0............r...p(....&......o....&...*...................n..t.....o......{....o....&*.....(.....*~..{....o......{....o....(.....*.0..+.........,..{.......+....,...{....o........( ....*..0............s!...}.........("...s#.....s$...}.....s%...}.....s%...}......{....s&...}.....s'...}.....s%...}.....s%...}.....s(...}.....{....o).....{....o)..

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.848207378321331
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:JMG Memo-Circular No 018-21.PDF.exe
                                                File size:714240
                                                MD5:f12d78ae2ce77b187e98b382bc400e6e
                                                SHA1:a4a09f0297221e8e3d8f510f139a10b30b9bb7e8
                                                SHA256:019dce879f64d1a5a23de8ae1d0eac08200954b26665232507187e7f524b4f24
                                                SHA512:579431d0548682078764625d5557ca247371ad661483067a0a6f167dd2bbcc6597bf1eb38d1e6c1442fba0c5fe4166b23ee088716669ee023ed40fd2d74d12fb
                                                SSDEEP:12288:/GTEIGBl1jcqvSq5HGO9rHCrnaRsGFPY6:/4GJoGb586sGW
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n4`..............0.................. ........@.. .......................@............@................................

                                                File Icon

                                                Icon Hash:00828e8e8686b000

                                                Static PE Info

                                                General

                                                Entrypoint:0x4afa12
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x60346EDF [Tue Feb 23 02:56:31 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xaf9c00x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x5bc.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xada180xadc00False0.641475101169data6.85708013981IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0xb00000x5bc0x600False0.427734375data4.17835569361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xb20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0xb00900x32cdata
                                                RT_MANIFEST0xb03cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright 2016
                                                Assembly Version1.0.0.0
                                                InternalName5owG60.exe
                                                FileVersion1.0.0.0
                                                CompanyName
                                                LegalTrademarks
                                                Comments
                                                ProductNameCore.Numero
                                                ProductVersion1.0.0.0
                                                FileDescriptionCore.Numero
                                                OriginalFilename5owG60.exe

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                02/23/21-08:40:22.477560TCP2025019ET TROJAN Possible NanoCore C2 60B497189036192.168.2.591.212.153.84
                                                02/23/21-08:40:31.001172TCP2025019ET TROJAN Possible NanoCore C2 60B497199036192.168.2.591.212.153.84
                                                02/23/21-08:40:38.101612TCP2025019ET TROJAN Possible NanoCore C2 60B497209036192.168.2.591.212.153.84
                                                02/23/21-08:40:44.976945TCP2025019ET TROJAN Possible NanoCore C2 60B497229036192.168.2.591.212.153.84
                                                02/23/21-08:40:52.211286TCP2025019ET TROJAN Possible NanoCore C2 60B497279036192.168.2.591.212.153.84
                                                02/23/21-08:40:59.018915TCP2025019ET TROJAN Possible NanoCore C2 60B497289036192.168.2.591.212.153.84
                                                02/23/21-08:41:06.599920TCP2025019ET TROJAN Possible NanoCore C2 60B497349036192.168.2.591.212.153.84
                                                02/23/21-08:41:15.848682TCP2025019ET TROJAN Possible NanoCore C2 60B497359036192.168.2.591.212.153.84
                                                02/23/21-08:41:22.701844TCP2025019ET TROJAN Possible NanoCore C2 60B497369036192.168.2.591.212.153.84
                                                02/23/21-08:41:29.724607TCP2025019ET TROJAN Possible NanoCore C2 60B497379036192.168.2.591.212.153.84
                                                02/23/21-08:41:34.259656TCP2025019ET TROJAN Possible NanoCore C2 60B497399036192.168.2.591.212.153.84
                                                02/23/21-08:41:40.252014TCP2025019ET TROJAN Possible NanoCore C2 60B497409036192.168.2.591.212.153.84
                                                02/23/21-08:41:45.641221TCP2025019ET TROJAN Possible NanoCore C2 60B497419036192.168.2.591.212.153.84
                                                02/23/21-08:41:53.912826TCP2025019ET TROJAN Possible NanoCore C2 60B497429036192.168.2.591.212.153.84

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Feb 23, 2021 08:40:22.306313038 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:22.362927914 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:22.363090038 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:22.477560043 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:22.541064978 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:22.609545946 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:22.663753986 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:22.713645935 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:22.856252909 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:22.936887980 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.001763105 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.001796007 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.001812935 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.001830101 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.002203941 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.045665979 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.055763006 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.055793047 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.055939913 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.055958986 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.055980921 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.055999041 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.056015968 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.056032896 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.056036949 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.056075096 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.056081057 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.056086063 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.109719992 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109749079 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109766006 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109782934 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109798908 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109814882 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109831095 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109849930 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109869003 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109882116 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109899998 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109916925 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109920025 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.109930992 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109942913 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.109952927 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.109956980 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109975100 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.109987020 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.109992027 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.113658905 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.113692045 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.163817883 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163847923 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163866043 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163883924 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163901091 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163914919 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163932085 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163949966 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163968086 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.163975000 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.163985968 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164010048 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164027929 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164043903 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164057016 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164073944 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164093971 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164112091 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164113045 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.164120913 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.164129019 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164145947 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164161921 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.164248943 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.164261103 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.164263964 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.166469097 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.166491985 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.166610003 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.166629076 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.166822910 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.166850090 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.167081118 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167100906 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167117119 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167133093 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167149067 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167167902 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167185068 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167236090 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.167397976 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.167418957 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.167423010 CET497189036192.168.2.591.212.153.84
                                                Feb 23, 2021 08:40:23.217665911 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.217693090 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.217711926 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.217730045 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.217746973 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.217761993 CET90364971891.212.153.84192.168.2.5
                                                Feb 23, 2021 08:40:23.217778921 CET90364971891.212.153.84192.168.2.5

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Feb 23, 2021 08:39:44.691495895 CET6434453192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:44.730628014 CET6206053192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:44.740154028 CET53643448.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:44.779218912 CET53620608.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:45.486394882 CET6180553192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:45.543379068 CET53618058.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:46.681488037 CET5479553192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:46.730142117 CET53547958.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:47.484688997 CET4955753192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:47.541548967 CET53495578.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:48.200928926 CET6173353192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:48.258153915 CET53617338.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:48.261364937 CET6544753192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:48.312700987 CET53654478.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:49.133738041 CET5244153192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:49.216839075 CET53524418.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:50.872056007 CET6217653192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:50.921138048 CET53621768.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:51.670185089 CET5959653192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:51.721510887 CET53595968.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:52.497791052 CET6529653192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:52.549416065 CET53652968.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:53.853389978 CET6318353192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:53.910558939 CET53631838.8.8.8192.168.2.5
                                                Feb 23, 2021 08:39:55.442152023 CET6015153192.168.2.58.8.8.8
                                                Feb 23, 2021 08:39:55.493588924 CET53601518.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:13.955656052 CET5696953192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:14.015691042 CET53569698.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:22.075712919 CET5516153192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:22.290473938 CET53551618.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:30.885245085 CET5475753192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:30.945283890 CET53547578.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:37.830142975 CET4999253192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:38.041395903 CET53499928.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:39.956291914 CET6007553192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:40.899060965 CET53600758.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:44.864003897 CET5501653192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:44.920957088 CET53550168.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:44.984555960 CET6434553192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:45.042771101 CET53643458.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:45.509427071 CET5712853192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:45.558054924 CET53571288.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:52.009077072 CET5479153192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:52.060513973 CET53547918.8.8.8192.168.2.5
                                                Feb 23, 2021 08:40:58.732026100 CET5046353192.168.2.58.8.8.8
                                                Feb 23, 2021 08:40:58.947155952 CET53504638.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:03.406004906 CET5039453192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:03.465306997 CET53503948.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:06.286660910 CET5853053192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:06.343776941 CET53585308.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:13.806901932 CET5381353192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:14.826397896 CET5381353192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:15.792766094 CET53538138.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:22.557945013 CET6373253192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:22.615175962 CET53637328.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:29.611041069 CET5734453192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:29.668272972 CET53573448.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:33.882359982 CET5445053192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:33.936230898 CET53544508.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:34.144674063 CET5926153192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:34.203854084 CET53592618.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:40.148147106 CET5715153192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:40.196775913 CET53571518.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:45.525274992 CET5941353192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:45.585443974 CET53594138.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:53.790009022 CET6051653192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:53.838754892 CET53605168.8.8.8192.168.2.5
                                                Feb 23, 2021 08:41:55.965818882 CET5164953192.168.2.58.8.8.8
                                                Feb 23, 2021 08:41:56.041786909 CET53516498.8.8.8192.168.2.5

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Feb 23, 2021 08:40:22.075712919 CET192.168.2.58.8.8.80xa521Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:30.885245085 CET192.168.2.58.8.8.80x43aaStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:37.830142975 CET192.168.2.58.8.8.80x85cStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:44.864003897 CET192.168.2.58.8.8.80xe3deStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:52.009077072 CET192.168.2.58.8.8.80xe92Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:58.732026100 CET192.168.2.58.8.8.80x681bStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:06.286660910 CET192.168.2.58.8.8.80x3f0dStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:13.806901932 CET192.168.2.58.8.8.80xe5e7Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:14.826397896 CET192.168.2.58.8.8.80xe5e7Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:22.557945013 CET192.168.2.58.8.8.80x924eStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:29.611041069 CET192.168.2.58.8.8.80xfa33Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:34.144674063 CET192.168.2.58.8.8.80x99c8Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:40.148147106 CET192.168.2.58.8.8.80x1f1aStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:45.525274992 CET192.168.2.58.8.8.80x31daStandard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:53.790009022 CET192.168.2.58.8.8.80x4858Standard query (0)shahzad73.casacam.netA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Feb 23, 2021 08:40:22.290473938 CET8.8.8.8192.168.2.50xa521No error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:30.945283890 CET8.8.8.8192.168.2.50x43aaNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:38.041395903 CET8.8.8.8192.168.2.50x85cNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:44.920957088 CET8.8.8.8192.168.2.50xe3deNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:52.060513973 CET8.8.8.8192.168.2.50xe92No error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:40:58.947155952 CET8.8.8.8192.168.2.50x681bNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:06.343776941 CET8.8.8.8192.168.2.50x3f0dNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:15.792766094 CET8.8.8.8192.168.2.50xe5e7No error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:22.615175962 CET8.8.8.8192.168.2.50x924eNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:29.668272972 CET8.8.8.8192.168.2.50xfa33No error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:34.203854084 CET8.8.8.8192.168.2.50x99c8No error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:40.196775913 CET8.8.8.8192.168.2.50x1f1aNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:45.585443974 CET8.8.8.8192.168.2.50x31daNo error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)
                                                Feb 23, 2021 08:41:53.838754892 CET8.8.8.8192.168.2.50x4858No error (0)shahzad73.casacam.net91.212.153.84A (IP address)IN (0x0001)

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:08:39:52
                                                Start date:23/02/2021
                                                Path:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe'
                                                Imagebase:0xe50000
                                                File size:714240 bytes
                                                MD5 hash:F12D78AE2CE77B187E98B382BC400E6E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.280456931.00000000041C9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:08:40:15
                                                Start date:23/02/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp1B75.tmp'
                                                Imagebase:0x9a0000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:40:16
                                                Start date:23/02/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:40:16
                                                Start date:23/02/2021
                                                Path:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                Wow64 process (32bit):true
                                                Commandline:{path}
                                                Imagebase:0x710000
                                                File size:714240 bytes
                                                MD5 hash:F12D78AE2CE77B187E98B382BC400E6E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.501005046.0000000006DD0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.498456853.0000000005380000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.501098807.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.501098807.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.492270047.0000000002BFD000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.496807047.0000000003E81000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.500985326.0000000006DC0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.500985326.0000000006DC0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.501114313.0000000006E20000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.501114313.0000000006E20000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.500970500.0000000006DB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.500970500.0000000006DB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.500950111.0000000006DA0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.500950111.0000000006DA0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.500819703.0000000006BF0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.500819703.0000000006BF0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.501154629.0000000006E60000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.501154629.0000000006E60000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.496443867.0000000003BE1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.501030742.0000000006DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.501030742.0000000006DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.500935667.0000000006D90000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.500935667.0000000006D90000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.498042432.0000000005230000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.496714685.0000000003DA4000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.488093735.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.492154123.0000000002B91000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.501047468.0000000006DF0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.501047468.0000000006DF0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.497599353.0000000005170000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.497599353.0000000005170000.00000004.00000001.sdmp, Author: Florian Roth
                                                Reputation:low

                                                General

                                                Start time:08:40:19
                                                Start date:23/02/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC90F.tmp'
                                                Imagebase:0x9a0000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:40:19
                                                Start date:23/02/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:40:20
                                                Start date:23/02/2021
                                                Path:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe' 0
                                                Imagebase:0x870000
                                                File size:714240 bytes
                                                MD5 hash:F12D78AE2CE77B187E98B382BC400E6E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.352208720.0000000003E79000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:08:40:46
                                                Start date:23/02/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\GmaLrlDR' /XML 'C:\Users\user\AppData\Local\Temp\tmp8F7C.tmp'
                                                Imagebase:0xd80000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:40:46
                                                Start date:23/02/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:40:47
                                                Start date:23/02/2021
                                                Path:C:\Users\user\Desktop\JMG Memo-Circular No 018-21.PDF.exe
                                                Wow64 process (32bit):true
                                                Commandline:{path}
                                                Imagebase:0xd60000
                                                File size:714240 bytes
                                                MD5 hash:F12D78AE2CE77B187E98B382BC400E6E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.366475568.0000000003151000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.366560257.0000000004159000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.365338773.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >