Loading ...

Play interactive tourEdit tour

Analysis Report NEW_ORDER.pdf.exe

Overview

General Information

Sample Name:NEW_ORDER.pdf.exe
Analysis ID:382703
MD5:17bdd9b47882dfba3b0d800f94d7dbc1
SHA1:fba3196ceef380d49c18322ba1201b1afb9c9991
SHA256:5802e266beeabe10852b45ee17c86e9c7c8b62bc155848c809d3781e1b7a9123
Tags:exeNanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NEW_ORDER.pdf.exe (PID: 7156 cmdline: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' MD5: 17BDD9B47882DFBA3B0D800F94D7DBC1)
    • schtasks.exe (PID: 5124 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5832 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 16 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        4.2.RegSvcs.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        4.2.RegSvcs.exe.5144629.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xb184:$x1: NanoCore.ClientPluginHost
        • 0xb1b1:$x2: IClientNetworkHost
        Click to see the 35 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5832, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' , ParentImage: C:\Users\user\Desktop\NEW_ORDER.pdf.exe, ParentProcessId: 7156, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp', ProcessId: 5124

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\lmZfKRr.exeMetadefender: Detection: 13%Perma Link
        Source: C:\Users\user\AppData\Roaming\lmZfKRr.exeReversingLabs: Detection: 54%
        Multi AV Scanner detection for submitted fileShow sources
        Source: NEW_ORDER.pdf.exeMetadefender: Detection: 13%Perma Link
        Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 46%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE
        Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.RegSvcs.exe.5140000.8.unpackAvira: Label: TR/NanoCore.fadte
        Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: wealth2021.ddns.net
        Source: Malware configuration extractorURLs: 185.140.53.138
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: wealth2021.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49727 -> 185.140.53.138:20221
        Source: Joe Sandbox ViewIP Address: 185.140.53.138 185.140.53.138
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownDNS traffic detected: queries for: wealth2021.ddns.net
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: NEW_ORDER.pdf.exeString found in binary or memory: http://www.efg2.com/Lab/Library/ImageProcessing/DHALF.TXT
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: NEW_ORDER.pdf.exeString found in binary or memory: http://www.tannerhelland.com/4660/dithering-eleven-algorithms-source-code/
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: NEW_ORDER.pdf.exeString found in binary or memory: https://github.com/Whiplash141/Whips-Image-Converter/releases/latest
        Source: NEW_ORDER.pdf.exeString found in binary or memory: https://stackoverflow.com/questions/5940188/how-to-convert-a-24-bit-png-to-3-bit-png-using-floyd-ste
        Source: RegSvcs.exe, 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5130000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.29b4920.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
        Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A2980_2_0298A298
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02980A500_2_02980A50
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029863D00_2_029863D0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029800400_2_02980040
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029819800_2_02981980
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02988EC80_2_02988EC8
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298C50C0_2_0298C50C
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A2880_2_0298A288
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983A380_2_02983A38
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983A290_2_02983A29
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02980A410_2_02980A41
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029833B10_2_029833B1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029833C00_2_029833C0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029863C20_2_029863C2
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029840800_2_02984080
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029818800_2_02981880
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029868D00_2_029868D0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029800060_2_02980006
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029818540_2_02981854
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298407A0_2_0298407A
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298F1C80_2_0298F1C8
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983E900_2_02983E90
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02988EB70_2_02988EB7
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983EA00_2_02983EA0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02989F100_2_02989F10
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02989F020_2_02989F02
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983C580_2_02983C58
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_02983C490_2_02983C49
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029854450_2_02985445
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_029854680_2_02985468
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A5300_2_0298A530
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0298A5200_2_0298A520
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7B6F00_2_04F7B6F0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F749880_2_04F74988
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7B6E00_2_04F7B6E0
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F752580_2_04F75258
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7524B0_2_04F7524B
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F76CD40_2_04F76CD4
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F76CD10_2_04F76CD1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F72E140_2_04F72E14
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_006279C10_2_006279C1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_027DE4714_2_027DE471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_027DE4804_2_027DE480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_027DBBD44_2_027DBBD4
        Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilename vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665616120.000000000F530000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665854825.000000000F620000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665854825.000000000F620000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.657260140.00000000029F1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.659038115.0000000004326000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamey~ vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilenamey~ vs NEW_ORDER.pdf.exe
        Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.5130000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5130000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.29b4920.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.29b4920.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: lmZfKRr.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/4@11/1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\lmZfKRr.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5720:120:WilError_01
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\NjUgKeijLA
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ae697278-0563-480d-a326-4f0ab2164ba0}
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53CF.tmpJump to behavior
        Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: NEW_ORDER.pdf.exeMetadefender: Detection: 13%
        Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 46%
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\NEW_ORDER.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\NEW_ORDER.pdf.exe 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: NEW_ORDER.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains method to dynamically call methods (often used by packers)Show sources
        Source: NEW_ORDER.pdf.exe, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: lmZfKRr.exe.0.dr, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.0.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        Source: 0.2.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
        .NET source code contains potential unpackerShow sources
        Source: NEW_ORDER.pdf.exe, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: lmZfKRr.exe.0.dr, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.NEW_ORDER.pdf.exe.620000.0.unpack, SqlFormatter/Graham_And_Jarvis.cs.Net Code: sssss System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_04F7304A push eax; retf 0_2_04F73051
        Source: initial sampleStatic PE information: section name: .text entropy: 7.88331546414
        Source: initial sampleStatic PE information: section name: .text entropy: 7.88331546414
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\lmZfKRr.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: NEW_ORDER.pdf.exe
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1967Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7696Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 984Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 7160Thread sleep time: -31500s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 2936Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 31500Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: RegSvcs.exe, 00000004.00000002.904487447.0000000000B6D000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: RegSvcs.exe, 00000004.00000002.908885476.0000000006380000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 600008Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'Jump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
        Source: RegSvcs.exe, 00000004.00000002.905070575.00000000029F3000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000004.00000002.905070575.00000000029F3000.00000004.00000001.sdmpBinary or memory string: Program Managerd
        Source: RegSvcs.exe, 00000004.00000002.904625704.0000000001280000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000004.00000002.904625704.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegSvcs.exe, 00000004.00000002.904526080.0000000000E8E000.00000004.00000010.sdmpBinary or memory string: Program ManagerlZ
        Source: RegSvcs.exe, 00000004.00000002.908544176.0000000005B3C000.00000004.00000001.sdmpBinary or memory string: Program Managerl
        Source: RegSvcs.exe, 00000004.00000002.905070575.00000000029F3000.00000004.00000001.sdmpBinary or memory string: Program Managerx
        Source: RegSvcs.exe, 00000004.00000002.904625704.0000000001280000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Users\user\Desktop\NEW_ORDER.pdf.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: NEW_ORDER.pdf.exe, 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5832, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 7156, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5144629.9.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cb146.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5140000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39d45a5.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.39cff7c.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3d42b30.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3c9c0e0.2.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Masquerading11Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information12Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing23DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        NEW_ORDER.pdf.exe19%MetadefenderBrowse
        NEW_ORDER.pdf.exe47%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\lmZfKRr.exe19%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\lmZfKRr.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.RegSvcs.exe.5140000.8.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        wealth2021.ddns.net0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        185.140.53.1380%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        wealth2021.ddns.net
        185.140.53.138
        truetrue
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          wealth2021.ddns.nettrue
          • Avira URL Cloud: safe
          unknown
          185.140.53.138true
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.tannerhelland.com/4660/dithering-eleven-algorithms-source-code/NEW_ORDER.pdf.exefalse
                            high
                            http://www.fontbureau.com/designers8NEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                              high
                              https://github.com/Whiplash141/Whips-Image-Converter/releases/latestNEW_ORDER.pdf.exefalse
                                high
                                http://www.fonts.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://stackoverflow.com/questions/5940188/how-to-convert-a-24-bit-png-to-3-bit-png-using-floyd-steNEW_ORDER.pdf.exefalse
                                    high
                                    http://www.efg2.com/Lab/Library/ImageProcessing/DHALF.TXTNEW_ORDER.pdf.exefalse
                                      high
                                      http://www.urwpp.deDPleaseNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cnNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNEW_ORDER.pdf.exe, 00000000.00000002.665162901.0000000007943000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sakkal.comNEW_ORDER.pdf.exe, 00000000.00000002.662939421.0000000006B12000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown

                                        Contacted IPs

                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs

                                        Public

                                        IPDomainCountryFlagASNASN NameMalicious
                                        185.140.53.138
                                        wealth2021.ddns.netSweden
                                        209623DAVID_CRAIGGGtrue

                                        General Information

                                        Joe Sandbox Version:31.0.0 Emerald
                                        Analysis ID:382703
                                        Start date:06.04.2021
                                        Start time:14:57:10
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 7m 17s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Sample file name:NEW_ORDER.pdf.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:19
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@6/4@11/1
                                        EGA Information:Failed
                                        HDC Information:
                                        • Successful, ratio: 0% (good quality ratio 0%)
                                        • Quality average: 85%
                                        • Quality standard deviation: 17.6%
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 73
                                        • Number of non-executed functions: 20
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Found application associated with file extension: .exe
                                        Warnings:
                                        Show All
                                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                        • Excluded IPs from analysis (whitelisted): 13.107.246.254, 104.43.193.48, 52.147.198.201, 20.82.209.183, 92.122.213.194, 92.122.213.247, 13.88.21.125, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210, 20.82.210.154, 52.255.188.83, 20.50.102.62
                                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, t-ring.msedge.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, t-9999.t-msedge.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, t-ring.t-9999.t-msedge.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/382703/sample/NEW_ORDER.pdf.exe

                                        Simulations

                                        Behavior and APIs

                                        TimeTypeDescription
                                        14:57:58API Interceptor2x Sleep call for process: NEW_ORDER.pdf.exe modified

                                        Joe Sandbox View / Context

                                        IPs

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        185.140.53.138Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                          URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                            Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                              1PH37n4Gva.exeGet hashmaliciousBrowse
                                                35dbds3GQG.exeGet hashmaliciousBrowse
                                                  QXJGE2LOdP.exeGet hashmaliciousBrowse
                                                    O4m3hDFNbh.exeGet hashmaliciousBrowse
                                                      nrv_remittance#U007eorder#U007epayment.exeGet hashmaliciousBrowse
                                                        NEW ORDER REQUEST_EXPORT005JKL DOC.exeGet hashmaliciousBrowse
                                                          WIRE COPY ORDER T104484_PP.exeGet hashmaliciousBrowse
                                                            71AXBkD1wA.exeGet hashmaliciousBrowse

                                                              Domains

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              wealth2021.ddns.netQuotation_Request.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138

                                                              ASN

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              DAVID_CRAIGGGDoc_58YJ54-521DERG701-55YH701.exeGet hashmaliciousBrowse
                                                              • 185.140.53.230
                                                              Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              FRQ_05694 revised quantity.exeGet hashmaliciousBrowse
                                                              • 185.140.53.69
                                                              INVOICE 15112021.xlsxGet hashmaliciousBrowse
                                                              • 185.140.53.130
                                                              URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              IMG-001982-AW00173-SSE73I.exeGet hashmaliciousBrowse
                                                              • 185.140.53.230
                                                              FYI-Orderimg.exeGet hashmaliciousBrowse
                                                              • 185.140.53.67
                                                              Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.138
                                                              PO-94765809570-Order pdf.exeGet hashmaliciousBrowse
                                                              • 185.140.53.7
                                                              Commercial E-invoice.exeGet hashmaliciousBrowse
                                                              • 185.140.53.137
                                                              Order23032021.xlsGet hashmaliciousBrowse
                                                              • 185.140.53.130
                                                              ZcQwvgqtuQ.exeGet hashmaliciousBrowse
                                                              • 91.193.75.245
                                                              lKIPqaYkKB.exeGet hashmaliciousBrowse
                                                              • 185.140.53.161
                                                              t5R60D503x.exeGet hashmaliciousBrowse
                                                              • 185.140.53.9
                                                              Purchase OrderDated19032021.xlsGet hashmaliciousBrowse
                                                              • 185.140.53.130
                                                              0u1JLpIwRo.exeGet hashmaliciousBrowse
                                                              • 185.140.53.139
                                                              PO-21322.xlsmGet hashmaliciousBrowse
                                                              • 185.165.153.116
                                                              GT_0397337_03987638BNG.exeGet hashmaliciousBrowse
                                                              • 185.140.53.9
                                                              5woB0vy0X6.exeGet hashmaliciousBrowse
                                                              • 185.140.53.139
                                                              Doc_IMAGE-587HTY-9545-55401.exeGet hashmaliciousBrowse
                                                              • 185.140.53.230

                                                              JA3 Fingerprints

                                                              No context

                                                              Dropped Files

                                                              No context

                                                              Created / dropped Files

                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW_ORDER.pdf.exe.log
                                                              Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.355304211458859
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                              MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                              Malicious:true
                                                              Reputation:high, very likely benign file
                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                              C:\Users\user\AppData\Local\Temp\tmp53CF.tmp
                                                              Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1640
                                                              Entropy (8bit):5.176392077301857
                                                              Encrypted:false
                                                              SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGCaItn:cbhK79lNQR/rydbz9I3YODOLNdq3Z
                                                              MD5:39E567FE518CA8EDB0AD37D54E7A6104
                                                              SHA1:59C9DFBF1A6CB4EF179AE5B8FFBB37DE4571A5EE
                                                              SHA-256:78F5BB3FDBB676F649A6165362193FF71DA638D9021B8AD8DC464C891EC84A42
                                                              SHA-512:0A1E9A361C3F2FD0F0324A07F631E51830E4398D201798CA69A4112EABB88E37D1E2EB4C51B3E5D1D6CB7715F8901C6A3E551B730831D8C70C1C356EBA7B7633
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              File Type:Non-ISO extended-ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):8
                                                              Entropy (8bit):3.0
                                                              Encrypted:false
                                                              SSDEEP:3:f7/t:Tl
                                                              MD5:BA96EE5A0ADF7C7F588EAADA2E18CF3A
                                                              SHA1:9F751596B956F6C75FD2E4F447979A0DDB859F08
                                                              SHA-256:9D3F3D537AE6BDBD90E1CA94DCA09925A05D9CE84EA9FB0605F19BDF8676EFC1
                                                              SHA-512:7EEBED8E803D20FB77A11215F5AE9B1070FA9F169A4021E4F38ADB14D082B4CA3EE6C8948028F0AD58DE8E1231E01749C0088F861EFA5CA5C905DB1E61DBBD05
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview: .....H
                                                              C:\Users\user\AppData\Roaming\lmZfKRr.exe
                                                              Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):812032
                                                              Entropy (8bit):7.87719204655292
                                                              Encrypted:false
                                                              SSDEEP:12288:6ofCEqJj8Sm2zaxyc8fIJ34zphf/ctoaTTrkY0tt7T4tWAOFNViq78PcuYl:6oaEqRMyVfI8n3gT4JbY8Ji2M
                                                              MD5:17BDD9B47882DFBA3B0D800F94D7DBC1
                                                              SHA1:FBA3196CEEF380D49C18322BA1201B1AFB9C9991
                                                              SHA-256:5802E266BEEABE10852B45EE17C86E9C7C8B62BC155848C809D3781E1B7A9123
                                                              SHA-512:5518F9FED2B8CBC3885954A30ADCB8756CED23EFF41C53A3F3DAEAD31F83169A84BD21E6636AA632A18E735B9519F25EA845370E382F7F92C0C4DFB360EE08F3
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Metadefender, Detection: 19%, Browse
                                                              • Antivirus: ReversingLabs, Detection: 54%
                                                              Reputation:low
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....k`..............0..Z..........^v... ........@.. ....................................@..................................v..O.................................................................................... ............... ..H............text....X... ...Z.................. ..`.rsrc................\..............@..@.reloc...............b..............@..B................@v......H........................................................................0...........r...p.+..*..0...........r...p.+..*".(.....*.0..G..........}......}......}..... ....}..... .....(......b`.(.....b`.(....`}....*..0..D..........}......}......}.......}..... .....(......b`.(.....b`.(....`}....*.0..+........... ........,.. ......+.......,.......+..*..0..>.........{.....{....Y(.....{.....{....Y(....X.{.....{....Y(....X.+..*...0............{....(.....+..*....0............".....(...

                                                              Static File Info

                                                              General

                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.87719204655292
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                              • Windows Screen Saver (13104/52) 0.07%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              File name:NEW_ORDER.pdf.exe
                                                              File size:812032
                                                              MD5:17bdd9b47882dfba3b0d800f94d7dbc1
                                                              SHA1:fba3196ceef380d49c18322ba1201b1afb9c9991
                                                              SHA256:5802e266beeabe10852b45ee17c86e9c7c8b62bc155848c809d3781e1b7a9123
                                                              SHA512:5518f9fed2b8cbc3885954a30adcb8756ced23eff41c53a3f3daead31f83169a84bd21e6636aa632a18e735b9519f25ea845370e382f7f92c0c4dfb360ee08f3
                                                              SSDEEP:12288:6ofCEqJj8Sm2zaxyc8fIJ34zphf/ctoaTTrkY0tt7T4tWAOFNViq78PcuYl:6oaEqRMyVfI8n3gT4JbY8Ji2M
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....k`..............0..Z..........^v... ........@.. ....................................@................................

                                                              File Icon

                                                              Icon Hash:00828e8e8686b000

                                                              Static PE Info

                                                              General

                                                              Entrypoint:0x4c765e
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                              Time Stamp:0x606B83FC [Mon Apr 5 21:41:16 2021 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:v4.0.30319
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                              Entrypoint Preview

                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add eax, 00000000h
                                                              add byte ptr [eax], al
                                                              add byte ptr [ecx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [ebx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [edx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [edx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [ecx], al
                                                              add byte ptr [eax], al
                                                              add dh, bh

                                                              Data Directories

                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc760c0x4f.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5ac.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                              Sections

                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000xc58ac0xc5a00False0.899721052736data7.88331546414IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xc80000x5ac0x600False0.424479166667data4.11601272417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xca0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                              Resources

                                                              NameRVASizeTypeLanguageCountry
                                                              RT_VERSION0xc80900x31cdata
                                                              RT_MANIFEST0xc83bc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                              Imports

                                                              DLLImport
                                                              mscoree.dll_CorExeMain

                                                              Version Infos

                                                              DescriptionData
                                                              Translation0x0000 0x04b0
                                                              LegalCopyrightCopyright 2014
                                                              Assembly Version1.0.0.0
                                                              InternalNamey.exe
                                                              FileVersion1.0.0.0
                                                              CompanyName
                                                              LegalTrademarks
                                                              Comments
                                                              ProductNameSqlFormatter
                                                              ProductVersion1.0.0.0
                                                              FileDescriptionSqlFormatter
                                                              OriginalFilenamey.exe

                                                              Network Behavior

                                                              Network Port Distribution

                                                              TCP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 6, 2021 14:58:05.147273064 CEST4972720221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:05.193897009 CEST2022149727185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:05.705436945 CEST4972720221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:05.753998041 CEST2022149727185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:06.268091917 CEST4972720221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:06.314373970 CEST2022149727185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:10.430963039 CEST4973020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:10.478168011 CEST2022149730185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:10.986983061 CEST4973020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:11.034450054 CEST2022149730185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:11.549582005 CEST4973020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:11.597069025 CEST2022149730185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:15.614948034 CEST4973220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:15.662126064 CEST2022149732185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:16.174989939 CEST4973220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:16.220699072 CEST2022149732185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:16.721911907 CEST4973220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:16.768621922 CEST2022149732185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:20.933881998 CEST4973620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:20.979547977 CEST2022149736185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:21.487879992 CEST4973620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:21.533593893 CEST2022149736185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:22.034960985 CEST4973620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:22.080630064 CEST2022149736185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:26.146341085 CEST4973820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:26.192018032 CEST2022149738185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:26.707721949 CEST4973820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:26.753480911 CEST2022149738185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:27.254050016 CEST4973820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:27.299705029 CEST2022149738185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:31.387415886 CEST4974020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:31.433103085 CEST2022149740185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:31.941874981 CEST4974020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:31.988670111 CEST2022149740185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:32.488835096 CEST4974020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:32.536633968 CEST2022149740185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:36.553973913 CEST4974620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:36.599664927 CEST2022149746185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:37.114222050 CEST4974620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:37.159900904 CEST2022149746185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:37.661113977 CEST4974620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:37.706602097 CEST2022149746185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:41.710304022 CEST4975320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:41.757996082 CEST2022149753185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:42.270863056 CEST4975320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:42.317116022 CEST2022149753185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:42.817785978 CEST4975320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:42.865220070 CEST2022149753185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:46.885031939 CEST4975620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:46.933924913 CEST2022149756185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:47.443211079 CEST4975620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:47.488663912 CEST2022149756185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:47.990066051 CEST4975620221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:48.035806894 CEST2022149756185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:52.108846903 CEST4976020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:52.154328108 CEST2022149760185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:52.662341118 CEST4976020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:52.708293915 CEST2022149760185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:53.225085974 CEST4976020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:53.270534039 CEST2022149760185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:57.388636112 CEST4976920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:57.434137106 CEST2022149769185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:57.944029093 CEST4976920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:57.989775896 CEST2022149769185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:58:58.490963936 CEST4976920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:58:58.536823988 CEST2022149769185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:02.606455088 CEST4977020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:02.652405977 CEST2022149770185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:03.163347006 CEST4977020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:03.209135056 CEST2022149770185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:03.710362911 CEST4977020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:03.757666111 CEST2022149770185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:07.778412104 CEST4977220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:07.863007069 CEST2022149772185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:08.366944075 CEST4977220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:08.412867069 CEST2022149772185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:08.913778067 CEST4977220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:08.960371971 CEST2022149772185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:12.979665041 CEST4977420221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:13.025278091 CEST2022149774185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:13.539076090 CEST4977420221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:13.586205006 CEST2022149774185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:14.085994959 CEST4977420221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:14.133135080 CEST2022149774185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:18.151887894 CEST4977820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:18.197343111 CEST2022149778185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:18.711524010 CEST4977820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:18.757230997 CEST2022149778185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:19.258344889 CEST4977820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:19.304474115 CEST2022149778185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:23.446026087 CEST4978020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:23.491497993 CEST2022149780185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:23.993082047 CEST4978020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:24.038691044 CEST2022149780185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:24.540031910 CEST4978020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:24.588740110 CEST2022149780185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:28.667238951 CEST4978520221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:28.712775946 CEST2022149785185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:29.227895021 CEST4978520221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:29.277070045 CEST2022149785185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:29.790465117 CEST4978520221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:29.836019039 CEST2022149785185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:33.899118900 CEST4978820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:33.944848061 CEST2022149788185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:34.447388887 CEST4978820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:34.493541002 CEST2022149788185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:34.994035959 CEST4978820221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:35.041292906 CEST2022149788185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:39.060332060 CEST4978920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:39.108253002 CEST2022149789185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:39.619582891 CEST4978920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:39.666052103 CEST2022149789185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:40.166465044 CEST4978920221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:40.215060949 CEST2022149789185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:44.233238935 CEST4979020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:44.281310081 CEST2022149790185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:44.791699886 CEST4979020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:44.837310076 CEST2022149790185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:45.338753939 CEST4979020221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:45.384480000 CEST2022149790185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:49.402688980 CEST4979120221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:49.450500011 CEST2022149791185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:49.964005947 CEST4979120221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:50.009507895 CEST2022149791185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:50.510935068 CEST4979120221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:50.558799028 CEST2022149791185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:54.682452917 CEST4979220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:54.729206085 CEST2022149792185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:55.230144978 CEST4979220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:55.277571917 CEST2022149792185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:55.792634010 CEST4979220221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:55.840471029 CEST2022149792185.140.53.138192.168.2.4
                                                              Apr 6, 2021 14:59:59.914755106 CEST4979320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 14:59:59.962681055 CEST2022149793185.140.53.138192.168.2.4
                                                              Apr 6, 2021 15:00:00.465336084 CEST4979320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 15:00:00.510960102 CEST2022149793185.140.53.138192.168.2.4
                                                              Apr 6, 2021 15:00:01.011862993 CEST4979320221192.168.2.4185.140.53.138
                                                              Apr 6, 2021 15:00:01.127098083 CEST2022149793185.140.53.138192.168.2.4

                                                              UDP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 6, 2021 14:57:46.748694897 CEST53530978.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:07.602477074 CEST4925753192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:07.648535967 CEST53492578.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:09.684362888 CEST6238953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:09.741121054 CEST53623898.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:11.050416946 CEST4991053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:11.096380949 CEST53499108.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:17.354785919 CEST5585453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:17.401576042 CEST53558548.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:18.336270094 CEST6454953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:18.383507967 CEST53645498.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:20.874919891 CEST6315353192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:20.931477070 CEST53631538.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:21.728527069 CEST5299153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:21.788741112 CEST53529918.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:26.085705042 CEST5370053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:26.144759893 CEST53537008.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:28.425663948 CEST5172653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:28.471601009 CEST53517268.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:31.320842028 CEST5679453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:31.377226114 CEST53567948.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:34.628859043 CEST5653453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:34.702776909 CEST53565348.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:35.198931932 CEST5662753192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:35.253509998 CEST53566278.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:35.688895941 CEST5662153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:35.747694016 CEST53566218.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:35.822873116 CEST6311653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:35.887654066 CEST53631168.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:36.201570988 CEST6407853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:36.256244898 CEST53640788.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:36.819554090 CEST6480153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:36.876899958 CEST53648018.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:37.470235109 CEST6172153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:37.533876896 CEST53617218.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:38.127764940 CEST5125553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:38.361290932 CEST53512558.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:39.233196974 CEST6152253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:39.367219925 CEST53615228.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:40.333481073 CEST5233753192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:40.387959003 CEST53523378.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:40.933494091 CEST5504653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:40.989588976 CEST53550468.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:42.355596066 CEST4961253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:42.410073042 CEST53496128.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:46.368907928 CEST4928553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:46.415062904 CEST53492858.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:47.166907072 CEST5060153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:47.217428923 CEST53506018.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:48.060162067 CEST6087553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:48.107306004 CEST53608758.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:49.156021118 CEST5644853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:49.215174913 CEST53564488.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:52.061729908 CEST5917253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:52.107770920 CEST53591728.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:52.903748989 CEST6242053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:52.953758955 CEST53624208.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:53.029941082 CEST6057953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:53.099467039 CEST53605798.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:55.085230112 CEST5018353192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:55.142219067 CEST53501838.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:58:57.291249037 CEST6153153192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:58:57.350332975 CEST53615318.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:02.557887077 CEST4922853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:02.604027987 CEST53492288.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:03.820203066 CEST5979453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:03.866555929 CEST53597948.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:11.376476049 CEST5591653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:11.423827887 CEST53559168.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:16.137386084 CEST5275253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:16.183969975 CEST53527528.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:16.904125929 CEST6054253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:16.952917099 CEST53605428.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:17.676310062 CEST6068953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:17.722225904 CEST53606898.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:18.516988993 CEST6420653192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:18.563946962 CEST53642068.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:23.389594078 CEST5090453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:23.444430113 CEST53509048.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:23.781377077 CEST5752553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:23.827682972 CEST53575258.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:24.987293959 CEST5381453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:25.033330917 CEST53538148.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:26.107867002 CEST5341853192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:26.159982920 CEST53534188.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:27.300051928 CEST6283353192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:27.346029997 CEST53628338.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:28.606669903 CEST5926053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:28.665932894 CEST53592608.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:29.426521063 CEST4994453192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:29.473968029 CEST53499448.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:31.196513891 CEST6330053192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:31.255347013 CEST53633008.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:33.841094971 CEST6144953192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:33.897640944 CEST53614498.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:54.621431112 CEST5127553192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:54.680380106 CEST53512758.8.8.8192.168.2.4
                                                              Apr 6, 2021 14:59:59.856945038 CEST6349253192.168.2.48.8.8.8
                                                              Apr 6, 2021 14:59:59.913978100 CEST53634928.8.8.8192.168.2.4

                                                              DNS Queries

                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                              Apr 6, 2021 14:58:20.874919891 CEST192.168.2.48.8.8.80x41c0Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:26.085705042 CEST192.168.2.48.8.8.80xc9afStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:31.320842028 CEST192.168.2.48.8.8.80xb36bStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:52.061729908 CEST192.168.2.48.8.8.80x5b64Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:57.291249037 CEST192.168.2.48.8.8.80xfb07Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:02.557887077 CEST192.168.2.48.8.8.80xa550Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:23.389594078 CEST192.168.2.48.8.8.80x2ee3Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:28.606669903 CEST192.168.2.48.8.8.80x2cfbStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:33.841094971 CEST192.168.2.48.8.8.80x9973Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:54.621431112 CEST192.168.2.48.8.8.80x29f2Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:59.856945038 CEST192.168.2.48.8.8.80xb40cStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)

                                                              DNS Answers

                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                              Apr 6, 2021 14:58:20.931477070 CEST8.8.8.8192.168.2.40x41c0No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:26.144759893 CEST8.8.8.8192.168.2.40xc9afNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:31.377226114 CEST8.8.8.8192.168.2.40xb36bNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:52.107770920 CEST8.8.8.8192.168.2.40x5b64No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:58:57.350332975 CEST8.8.8.8192.168.2.40xfb07No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:02.604027987 CEST8.8.8.8192.168.2.40xa550No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:23.444430113 CEST8.8.8.8192.168.2.40x2ee3No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:28.665932894 CEST8.8.8.8192.168.2.40x2cfbNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:33.897640944 CEST8.8.8.8192.168.2.40x9973No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:54.680380106 CEST8.8.8.8192.168.2.40x29f2No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                              Apr 6, 2021 14:59:59.913978100 CEST8.8.8.8192.168.2.40xb40cNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)

                                                              Code Manipulations

                                                              Statistics

                                                              CPU Usage

                                                              Click to jump to process

                                                              Memory Usage

                                                              Click to jump to process

                                                              High Level Behavior Distribution

                                                              Click to dive into process behavior distribution

                                                              Behavior

                                                              Click to jump to process

                                                              System Behavior

                                                              General

                                                              Start time:14:57:53
                                                              Start date:06/04/2021
                                                              Path:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
                                                              Imagebase:0x620000
                                                              File size:812032 bytes
                                                              MD5 hash:17BDD9B47882DFBA3B0D800F94D7DBC1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.657514928.0000000003B9A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              Reputation:low

                                                              General

                                                              Start time:14:58:01
                                                              Start date:06/04/2021
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lmZfKRr' /XML 'C:\Users\user\AppData\Local\Temp\tmp53CF.tmp'
                                                              Imagebase:0x1330000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:14:58:01
                                                              Start date:06/04/2021
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff724c50000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:14:58:01
                                                              Start date:06/04/2021
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:{path}
                                                              Imagebase:0x460000
                                                              File size:45152 bytes
                                                              MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.908113491.0000000005140000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.903831602.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.908094344.0000000005130000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.905010283.0000000002981000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.905761481.00000000039C9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              Reputation:high

                                                              Disassembly

                                                              Code Analysis

                                                              Reset < >

                                                                Executed Functions

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: -lL[$>x%m$>x%m
                                                                • API String ID: 0-35813436
                                                                • Opcode ID: 9bb18a062145c95ccc16d9354c9289a55bb9b0cabaa4d17f54d719c672251704
                                                                • Instruction ID: 94adb2542f9424338a8c305a6657631edf9776693e615a7eb1b57ae9fe9957ca
                                                                • Opcode Fuzzy Hash: 9bb18a062145c95ccc16d9354c9289a55bb9b0cabaa4d17f54d719c672251704
                                                                • Instruction Fuzzy Hash: 36A109B4D49209DFCB08DFA5D5846ADFBB6FF89310F28A82BD406AB254D7349941CF24
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: +]S
                                                                • API String ID: 0-2980124091
                                                                • Opcode ID: 8504830bedef16d57937d7f426d5e7d57a3d2cfa2989a97736ab1128cdaa1d4f
                                                                • Instruction ID: 48d43e16f8a75c0ac3dd6ae97a7364f165096d4660c69dd6cf2f8883c50d9d4e
                                                                • Opcode Fuzzy Hash: 8504830bedef16d57937d7f426d5e7d57a3d2cfa2989a97736ab1128cdaa1d4f
                                                                • Instruction Fuzzy Hash: 60F18E74D0424ADFCB04DFA6D4814AEFBB2FF8A300B19C59AC549AB256D7359A43CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: +]S
                                                                • API String ID: 0-2980124091
                                                                • Opcode ID: 6ace0acd98cf8697f0c6bce43c8721ff09ed5ec2a84eb8d653f570c294c24a80
                                                                • Instruction ID: c9c7d435e174fd609e00d23a4ccd5f778f6f77f38b4c1ffde752508a7fc7e077
                                                                • Opcode Fuzzy Hash: 6ace0acd98cf8697f0c6bce43c8721ff09ed5ec2a84eb8d653f570c294c24a80
                                                                • Instruction Fuzzy Hash: 5AF17D70D0424ACFCB04DFA9D4914AEFBB2FF8A310B19C59AC545AB256D7359A43CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: R.
                                                                • API String ID: 0-360849638
                                                                • Opcode ID: f61482b08ba91a7040ac65c1dbdc4118ebf42c437efa7101d909a341a45ade82
                                                                • Instruction ID: accb5c0fdc9def861f5de9019a22383ad303a8c026b3076b6da4ca5ddfd0602c
                                                                • Opcode Fuzzy Hash: f61482b08ba91a7040ac65c1dbdc4118ebf42c437efa7101d909a341a45ade82
                                                                • Instruction Fuzzy Hash: 84023570A05209DFDB04EFA9D984A9DBBF2FB49601F5AC0A9D408EB365DB309D85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: +]S
                                                                • API String ID: 0-2980124091
                                                                • Opcode ID: c5aa4011a4b7436e028d2d0b48439325f7336e2eaf64e834f3cbf2e994bfef29
                                                                • Instruction ID: b8a64ba4c128a4377156d0ca2e357281c117af8d81937a7f098d5b109948d702
                                                                • Opcode Fuzzy Hash: c5aa4011a4b7436e028d2d0b48439325f7336e2eaf64e834f3cbf2e994bfef29
                                                                • Instruction Fuzzy Hash: 17D12B74D0420ADFCB04DF9AD4808AEFBB2FF89301B19D55AD419AB355D734AA42CF94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: X%2
                                                                • API String ID: 0-1395182047
                                                                • Opcode ID: 119da767150c59d9397d938578931e79ba8c077dc8ecbcb3b7ed68189ab82350
                                                                • Instruction ID: a03d71cd1595c573981bc36df1f33eb7b9016f17034d5a2af227659978d83dab
                                                                • Opcode Fuzzy Hash: 119da767150c59d9397d938578931e79ba8c077dc8ecbcb3b7ed68189ab82350
                                                                • Instruction Fuzzy Hash: B481E274E0120D9FDB48DFA5D9446AEBBB2FF89300F24842AD816A7358EB349D12CF55
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: X%2
                                                                • API String ID: 0-1395182047
                                                                • Opcode ID: 263f57563ff9f0966d5c0450403f4236ff8a4cc678fd1a6c85167fe4a6b65067
                                                                • Instruction ID: 767ba9a8e0cb811a250265dcf631582863414f06b3a0aafd4a03dac174537aa9
                                                                • Opcode Fuzzy Hash: 263f57563ff9f0966d5c0450403f4236ff8a4cc678fd1a6c85167fe4a6b65067
                                                                • Instruction Fuzzy Hash: 1D81D274E0121D9FDB44DFA5D9446AEBBB2FF88300F24852AD816A7358EB345D02CF54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 90584d1cc9a840d6cb45e5c9d729de838155fe2b892fed1f90af501ac658b118
                                                                • Instruction ID: c0d95d8bb8d4e9656bcc589a75b47b7a9205e4fa5ec00d3b3fc6463b927cd42d
                                                                • Opcode Fuzzy Hash: 90584d1cc9a840d6cb45e5c9d729de838155fe2b892fed1f90af501ac658b118
                                                                • Instruction Fuzzy Hash: 5282C534A11219CFEB15EB74C884B99B3B1FF8A308F1145EAD5096B361DB35AE85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 796fd46bc2c61168962c1f710167a9894348918615fb4c567254a7d60e685f0d
                                                                • Instruction ID: 4cab1e360c9b887414efe7d6d43450353cee1c569f9073eab0d06bf0ca87732b
                                                                • Opcode Fuzzy Hash: 796fd46bc2c61168962c1f710167a9894348918615fb4c567254a7d60e685f0d
                                                                • Instruction Fuzzy Hash: 3682C534A11219CFEB15EB74C884B99B3B2FF8A308F1145EAD5096B361DB35AE85CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c97a3b54bac190e0e2fa0556bacaa250e24eedd017d0528826964754a4d7bee6
                                                                • Instruction ID: 08458daef11c5d4b42c41bbc9068195c2230c6934d1cf86acc9be9f27ace8fa9
                                                                • Opcode Fuzzy Hash: c97a3b54bac190e0e2fa0556bacaa250e24eedd017d0528826964754a4d7bee6
                                                                • Instruction Fuzzy Hash: 99C1D235E0031ACFDB04DFB4D854ADDBBB6FF89314F148616E005AB261EB78A942CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4bdab983ca0c8b8ab4119c260e8b12446f5cfcaddf87b74e71bb488971692cc5
                                                                • Instruction ID: f0191cee373d476df685cb9fda883ddefd453bf08df66623efbdb3ea1e5232bb
                                                                • Opcode Fuzzy Hash: 4bdab983ca0c8b8ab4119c260e8b12446f5cfcaddf87b74e71bb488971692cc5
                                                                • Instruction Fuzzy Hash: 7BB114B0E052598BCB04DFA9C640A9EFBF6EF89310F18D52AD409EB359D7349942CB64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0325d2426df54c1887e120da65341f53322cd536783f09c52279c2179c2a729c
                                                                • Instruction ID: 430729c1d0f9b6509ddeb8daee16f4c99879f86bdbb29f99416f2f13c6c50397
                                                                • Opcode Fuzzy Hash: 0325d2426df54c1887e120da65341f53322cd536783f09c52279c2179c2a729c
                                                                • Instruction Fuzzy Hash: 57B11470E052598FCB04DFA9CA40A9EFBF6EF89310F18D56AC409EB359D7349942CB64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 88e25780a88a90b0a230d6dfd8daea7a4595eb18b9cfb0c24fa73b02891effb0
                                                                • Instruction ID: 39d22d8eb8a82384029e22d2cdd0dde70a7f09f19c7a0058694538987490dd5c
                                                                • Opcode Fuzzy Hash: 88e25780a88a90b0a230d6dfd8daea7a4595eb18b9cfb0c24fa73b02891effb0
                                                                • Instruction Fuzzy Hash: E7819F36E0031A9FDB04DFF0D8548DDB7BAFF89314F148615E415AB2A4EB74A982CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e810de82931888c858b414b6255c57ec0225dd17e1d0a5d758b1a41af4111ea2
                                                                • Instruction ID: 49f206543c5b393440d652268ab76e8192d3d70a7a7c484bec761b8cd8732c15
                                                                • Opcode Fuzzy Hash: e810de82931888c858b414b6255c57ec0225dd17e1d0a5d758b1a41af4111ea2
                                                                • Instruction Fuzzy Hash: 7C819F35E0031A9FDB04DFF0E8548DDB7BAFF89314F148615E415AB2A4EB74A982DB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 611f44ff39c301ac5af09bc565231c4f67729c9c4408401bd85c3e3f59b10c6a
                                                                • Instruction ID: c92e860c6531bc810e62c75cad20013dcd0f746c302ea84eb4b302f20dd85d85
                                                                • Opcode Fuzzy Hash: 611f44ff39c301ac5af09bc565231c4f67729c9c4408401bd85c3e3f59b10c6a
                                                                • Instruction Fuzzy Hash: 5D615D70E0924A8FDB05CFA6C4505AEFBF2FF8A300F18D46AD055AB295D7345A06CF95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a0c8098e709220ed70e79deaf7dc9b6756b00f55693445d834e63bd6cfccf6a0
                                                                • Instruction ID: 33836411d6888dd6406c7f4729a1f8afc01c653b3cb6b890bf853036d9c50fd8
                                                                • Opcode Fuzzy Hash: a0c8098e709220ed70e79deaf7dc9b6756b00f55693445d834e63bd6cfccf6a0
                                                                • Instruction Fuzzy Hash: 1E615C70E06219DFCB04DFA5E9846DEFBB6EF89300F28982BD40ABB254D7748945CB15
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cd41f405d8fd4cf0139fff2c2846d7cbe052fa7dffcd99fadac927cac6c18c11
                                                                • Instruction ID: 0cd399a9a88e3f03cd7bafeba86bcad2d1a668dba6603616c2a9a42cee2609f4
                                                                • Opcode Fuzzy Hash: cd41f405d8fd4cf0139fff2c2846d7cbe052fa7dffcd99fadac927cac6c18c11
                                                                • Instruction Fuzzy Hash: A9614B74D06218DBCB14DFA5E9846EEFBB6EB89300F24A82BD40AB7254D7348945CB15
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8915b072c950fa3c0a520f588d85e4a7cdeb975236ad73bfae629ca825843da9
                                                                • Instruction ID: c8f8d43b0420d442c4003710c8d4c7376cfde0d1a421b4671415bb187e1093a4
                                                                • Opcode Fuzzy Hash: 8915b072c950fa3c0a520f588d85e4a7cdeb975236ad73bfae629ca825843da9
                                                                • Instruction Fuzzy Hash: 37511770E0520A8FDB08DFA6C5449AEFBF2FF89300F28D42AD459A7258D7349A41CF95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b6dee2c44bffe3547ece36671f5a48628f9feaafc5f218b561aecc0be67b4986
                                                                • Instruction ID: e844cba74250eb1d9da0a798efce8bfef57a92e5da345487c9d95ee07d3d702e
                                                                • Opcode Fuzzy Hash: b6dee2c44bffe3547ece36671f5a48628f9feaafc5f218b561aecc0be67b4986
                                                                • Instruction Fuzzy Hash: 3A21D6B1E016188BDB18CF9AD8443DEFBF7AFC9310F14C16AD508A6254DB7419458F50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 853dce2b204c1586e208156d4a32044e0cde4f097f6412bcebab4c04f587ef5a
                                                                • Instruction ID: 28c6782f5896754da881ffd0694c0a94a737ebc2cf4745d3e7ca9e15599e2197
                                                                • Opcode Fuzzy Hash: 853dce2b204c1586e208156d4a32044e0cde4f097f6412bcebab4c04f587ef5a
                                                                • Instruction Fuzzy Hash: 7421B871E016588BDB18CFA6D95539EBFF3AFC9304F18C16AD408AB264DB741946CF81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 04F70286
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: LO$LO
                                                                • API String ID: 4139908857-3320156768
                                                                • Opcode ID: 93d1ca7bbd405a7d574050d41a2b1a42f446877eefe8fba072e49123f4ab864e
                                                                • Instruction ID: ad65b15a11d61a0d783499feecc50e35a3ec31b009ed14f5033603fdfd167ccb
                                                                • Opcode Fuzzy Hash: 93d1ca7bbd405a7d574050d41a2b1a42f446877eefe8fba072e49123f4ab864e
                                                                • Instruction Fuzzy Hash: 25711470A00B058FD724DF6AD44579AB7F1FF88354F00892AD58AD7A50DB79F806CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 0298BC83
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 0b3d64941a0d881b686a35ec3d13bbea6ddc79841ebcff3d315c1612a8607e40
                                                                • Instruction ID: efab1ae16928172c667311bf222f4a11ce1a9abaafdbb57cbc15d97732320409
                                                                • Opcode Fuzzy Hash: 0b3d64941a0d881b686a35ec3d13bbea6ddc79841ebcff3d315c1612a8607e40
                                                                • Instruction Fuzzy Hash: 7C512771D003699FDB20DF99C890BDDBBB5AF88314F19809AE508A7210DB755A85CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 0298BC83
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 321a823aab0705c150a8a184dc48ba013e9d5d00dcecd9f9a5ab00fa7283d4f9
                                                                • Instruction ID: 7cdacd99104faf2090cc4c5ba394eb76fc356aaf30c8623414d43f1babb9aa53
                                                                • Opcode Fuzzy Hash: 321a823aab0705c150a8a184dc48ba013e9d5d00dcecd9f9a5ab00fa7283d4f9
                                                                • Instruction Fuzzy Hash: F4512671D00329DFEB20DF99C880BDDBBB5BF48314F19809AE508A7250DB749A85CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F76AEA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 6943743330a233c20a383b2a9f78d02cfa86511722aa84bdadcc52148fddf570
                                                                • Instruction ID: 1c047809a3f6d5114bf407a9d8ffa3424b6a72bf9f16cc40630c3a75931b6ac4
                                                                • Opcode Fuzzy Hash: 6943743330a233c20a383b2a9f78d02cfa86511722aa84bdadcc52148fddf570
                                                                • Instruction Fuzzy Hash: 7351E0B1C00249EFEF11CFA9C880ADDBFB1BF49314F14816AE418AB221D775A856CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F76AEA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: fe15817d002f97e26bd55545aeeeddbc2f0597f4d6af4719ad1f44a0b5b022f8
                                                                • Instruction ID: 97695faac8a6b144d9df56d676d5d87314fd58224a31d53cb44e243c8a5d4930
                                                                • Opcode Fuzzy Hash: fe15817d002f97e26bd55545aeeeddbc2f0597f4d6af4719ad1f44a0b5b022f8
                                                                • Instruction Fuzzy Hash: A651F5B1D00749DFEB15CF9AD890ADEBFB5BF49314F24812AE419AB210D774A845CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 01005421
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657079385.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 3f02e24812691a3d881ccb866755e961e66ab2457515f63570e68aaed010400f
                                                                • Instruction ID: 49769d8e9a73799b958a7ac67b25b138dc5783b5616c37de04e9b95280c73cb8
                                                                • Opcode Fuzzy Hash: 3f02e24812691a3d881ccb866755e961e66ab2457515f63570e68aaed010400f
                                                                • Instruction Fuzzy Hash: 83515671C04219CFEB14CFA9C8447DEBBF1BF49318F25806AD158AB291DBB85946CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F76AEA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 073c6938914e5d1657a6113849c5713f2fe54922d8bc941942898fd89e8d9429
                                                                • Instruction ID: 6adf933fed54984036865ce86c6bac1e6904922dec65faa3f951d34dfb0aee56
                                                                • Opcode Fuzzy Hash: 073c6938914e5d1657a6113849c5713f2fe54922d8bc941942898fd89e8d9429
                                                                • Instruction Fuzzy Hash: 7F51B0B1D00749EFEB14CF9AD984ADEBFB5BF48314F24812AE419AB210D774A845CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04F76AEA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 7984f7d34dddf2ec0ac390e572a3c4ea6409da415862dbbfae0647508cf1e172
                                                                • Instruction ID: 130024b4014d3afd2ac955bece28b6431ac44875e38459518682562188fceffe
                                                                • Opcode Fuzzy Hash: 7984f7d34dddf2ec0ac390e572a3c4ea6409da415862dbbfae0647508cf1e172
                                                                • Instruction Fuzzy Hash: 5341CFB1D00749EFEB14CF9AC894ADEBFB5BF48314F24812AE419AB210D774A845CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 04F79051
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: ae8dfc53fd6f9ac75d1db93443d2d155a20c6afa35d1b1751dca959a6a4919fb
                                                                • Instruction ID: 900148a4419e7ce99ed843242d789e620b37ccef5b8afced74c383f930257d89
                                                                • Opcode Fuzzy Hash: ae8dfc53fd6f9ac75d1db93443d2d155a20c6afa35d1b1751dca959a6a4919fb
                                                                • Instruction Fuzzy Hash: 58415AB4A002058FEB10CF99C488FAABBF5FF88314F158459D519A7321D779A842CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 01005421
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657079385.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 3db599247c4afdebeab8510b0369121aa001d2303b26678a9f88581203dc529c
                                                                • Instruction ID: d805c1f64f64d690b4de403fc24ba5af413a6a50e7e07ce9b33f8e753c04905f
                                                                • Opcode Fuzzy Hash: 3db599247c4afdebeab8510b0369121aa001d2303b26678a9f88581203dc529c
                                                                • Instruction Fuzzy Hash: 554105B0D0422DCFEB24DFA9C8447CEBBB5BF49308F118069D548AB251DBB56946CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 01005421
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657079385.0000000001000000.00000040.00000001.sdmp, Offset: 01000000, based on PE: false
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: f5cb7f52615f39f3e8b7089ee454a5d5f2e02bcaf4908f63e8a7a5f843866284
                                                                • Instruction ID: 4eeccd026b78493379f64c5d3401c8d5478e751a7f4bbc9c50467e66f9171e22
                                                                • Opcode Fuzzy Hash: f5cb7f52615f39f3e8b7089ee454a5d5f2e02bcaf4908f63e8a7a5f843866284
                                                                • Instruction Fuzzy Hash: 774117B0D04229CFEB14CFA9C8447CEBBB5BF49308F218069D448AB251DBB56946CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0298C165
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: c35d4af6b78d0a053605b21467529f8a6729a4b6dfc5868589535d36be0c34d0
                                                                • Instruction ID: 67ce320201af68329d58a80855ced1e55eda6eb5567ad8db0e4175cffeceb493
                                                                • Opcode Fuzzy Hash: c35d4af6b78d0a053605b21467529f8a6729a4b6dfc5868589535d36be0c34d0
                                                                • Instruction Fuzzy Hash: F22116B5900259DFDB10CFA9D884BEEBBF4FF48324F04842AE459A7650D778A945CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0298C165
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: 74ebf936d17e54b26a84660633845d126a3e88f03f92c03b6cc2617cc0f323ae
                                                                • Instruction ID: ec9d64d82d7566f968fcae637f98c75869c91ce7181df2543055a3f1179a559c
                                                                • Opcode Fuzzy Hash: 74ebf936d17e54b26a84660633845d126a3e88f03f92c03b6cc2617cc0f323ae
                                                                • Instruction Fuzzy Hash: 0C2116B5900359DFCB10CF9AC885BDEBBF4FB48314F04842AE518A3240D778A940CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04F7255E,?,?,?,?,?), ref: 04F7261F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 6a303ea73180e309347fa0323b23f936a52212de2544f809689092a3375aa971
                                                                • Instruction ID: 234f3060877585504d55274c311f5fec0d31cf2c7438fa453e102b6931b26955
                                                                • Opcode Fuzzy Hash: 6a303ea73180e309347fa0323b23f936a52212de2544f809689092a3375aa971
                                                                • Instruction Fuzzy Hash: DC2103B5D00248AFDB10CF99D984ADEBBF8EB48324F14806AE914A3310D378A951CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04F7255E,?,?,?,?,?), ref: 04F7261F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 0d05577115d0947b6a2a8151bda226dcbac1a017a797b560f9591a15f8cefd9c
                                                                • Instruction ID: 6c869888e26b5b9c8a4281ca11b555bf76fc782b5f08db862f13ff4951f0ade6
                                                                • Opcode Fuzzy Hash: 0d05577115d0947b6a2a8151bda226dcbac1a017a797b560f9591a15f8cefd9c
                                                                • Instruction Fuzzy Hash: B521E4B5D00249AFDB10CFA9D984ADEBFF4EB48324F14845AE914A7310D378A955CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,04F7255E,?,?,?,?,?), ref: 04F7261F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 3bdcb14b689f7a7f3e0207d0eaebc9387fc80978f03faf7b85b116822b51dbd8
                                                                • Instruction ID: 9d0fa9085f552e97317ea38e58d0aad9d64dbd16dde146ad5f03370ef0c7709e
                                                                • Opcode Fuzzy Hash: 3bdcb14b689f7a7f3e0207d0eaebc9387fc80978f03faf7b85b116822b51dbd8
                                                                • Instruction Fuzzy Hash: 2C2114B5D00249AFDB00CF99D884ADEBFF8EB48324F14805AE914A3310D378A954CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 0298BF17
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: ContextThread
                                                                • String ID:
                                                                • API String ID: 1591575202-0
                                                                • Opcode ID: 0b5b6a0947ae2a84305f091dcdc8a2741a422ece70c406485b37871b3b2d2252
                                                                • Instruction ID: 4d7da738faa9c493093e9cb876e31a0f72cdf5ed165854578559a855eea3cf92
                                                                • Opcode Fuzzy Hash: 0b5b6a0947ae2a84305f091dcdc8a2741a422ece70c406485b37871b3b2d2252
                                                                • Instruction Fuzzy Hash: 662149B1D002599FCB10CFAAC4857EEFBF4BB48224F04816AE458B3241D7789905CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0298BFDF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 1726664587-0
                                                                • Opcode ID: a2e867e84ce1f00b7e26c556cf7ca0ed9afde5ce313f8381b4a70c06548c0886
                                                                • Instruction ID: 89b5af1cf0288ba17341581bb38a6feeca76707a9421dadbff7be8638cd3ad90
                                                                • Opcode Fuzzy Hash: a2e867e84ce1f00b7e26c556cf7ca0ed9afde5ce313f8381b4a70c06548c0886
                                                                • Instruction Fuzzy Hash: F52102B59002499FCB10CF9AC884BDEBFF4FF48324F14842AE958A7250D739A940CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0298BFDF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 1726664587-0
                                                                • Opcode ID: 9327262b57ade77d05ef7c129219ee8d771d8cc4298163d39d3e8da0e6be2118
                                                                • Instruction ID: f28774ee7db0836fb7bb481f298f145462058515aa42303e4bee67977e377101
                                                                • Opcode Fuzzy Hash: 9327262b57ade77d05ef7c129219ee8d771d8cc4298163d39d3e8da0e6be2118
                                                                • Instruction Fuzzy Hash: 0521E2B59003599FCB10DF9AC884BDEBBF4FB48324F14842AE958A7250D778A554CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 0298BF17
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: ContextThread
                                                                • String ID:
                                                                • API String ID: 1591575202-0
                                                                • Opcode ID: 5f1eebc8261f0e1e168c668ab1370893192a418a90dee2ccf787564f59f31c5e
                                                                • Instruction ID: 364dc53ac3f7daf24a3ff9373a5be888e576620391de431748480bbb8a1b8621
                                                                • Opcode Fuzzy Hash: 5f1eebc8261f0e1e168c668ab1370893192a418a90dee2ccf787564f59f31c5e
                                                                • Instruction Fuzzy Hash: 6F2138B1D002599FCB00DF9AC845BDEFBF8BB48224F44812AE418B3640D778A944CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 04F70512
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: fccbfe2999ab74df73cb255c4be9db85a2f3ca97754b19435ae302cc7d78ff86
                                                                • Instruction ID: 09d9ef9b1e936bb4e9fd41d7c5f0cfdbbac212194a7d2460b51f651f3cb5e50f
                                                                • Opcode Fuzzy Hash: fccbfe2999ab74df73cb255c4be9db85a2f3ca97754b19435ae302cc7d78ff86
                                                                • Instruction Fuzzy Hash: 221112B6D002499FDB10CF9AD884BDEFBF4EF88324F04842AD419A7200C779A546CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 04F70512
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 33a0283dc6bee7cc3cc2d33d3607d44921dde31796f01982d2416eeb59d2fc91
                                                                • Instruction ID: e8901730a1cd3be0aeb7c1ae82c9ce1fbab45adc7243a524bf555f83ae28a796
                                                                • Opcode Fuzzy Hash: 33a0283dc6bee7cc3cc2d33d3607d44921dde31796f01982d2416eeb59d2fc91
                                                                • Instruction Fuzzy Hash: B611E2B6D002499FDB10CF9AD844BDEFBF4AF88324F14842AD419A7600C779A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0298C09B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: dc1654aa5f328985f2a940cd14b36314d65067df7c443c09e3853d21722799c3
                                                                • Instruction ID: acef22918290073dbb01b3ae437de0f0341b1287136e6ed472d31c09e9a21b7e
                                                                • Opcode Fuzzy Hash: dc1654aa5f328985f2a940cd14b36314d65067df7c443c09e3853d21722799c3
                                                                • Instruction Fuzzy Hash: 451116B5900289DFCB10DF99C884BDEBFF4EB58324F14841AE569A7210D375A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 04F70286
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 17bd59702e3371c908d6de7ab65bb9b55d81c5bcc516ab1d7c4afd2ec47b7e30
                                                                • Instruction ID: 4b8719f73c1c1e55291e5ebbba05552f52f7b331b05c41ce9336dfb0ba9d3577
                                                                • Opcode Fuzzy Hash: 17bd59702e3371c908d6de7ab65bb9b55d81c5bcc516ab1d7c4afd2ec47b7e30
                                                                • Instruction Fuzzy Hash: E311FDB6C002498FDB10CF9AC844BDEBBF4EF88324F14852AD429A7600C779A546CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0298C09B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 5413a961abbcd51b17feb6ef4e4dba6d40021528eaac071e0ae9a8fe8f67d5b2
                                                                • Instruction ID: 1a3004b13f73be8e1084b18b18d87456544f50e7d436e59372da37dd7796bc11
                                                                • Opcode Fuzzy Hash: 5413a961abbcd51b17feb6ef4e4dba6d40021528eaac071e0ae9a8fe8f67d5b2
                                                                • Instruction Fuzzy Hash: 1C11E0B59002899FCB10DF9AC884BDEBFF8EB48324F14841AE529A7210C375A954CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 0298D6D5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID:
                                                                • API String ID: 410705778-0
                                                                • Opcode ID: 4ae3267e8c659ac16ee69ebbe3d7e88d8337206aa3a53321bee5b1e82be7a67b
                                                                • Instruction ID: c722306b270ebdab6aaa9863bd691a5e61bded0726211bd55720438969a18632
                                                                • Opcode Fuzzy Hash: 4ae3267e8c659ac16ee69ebbe3d7e88d8337206aa3a53321bee5b1e82be7a67b
                                                                • Instruction Fuzzy Hash: FE1103B58003899FDB10CFA9D885BDEBFF8EB48324F14845AE559A7600C375A954CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 0298D6D5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID:
                                                                • API String ID: 410705778-0
                                                                • Opcode ID: f1897e6f69eb396191c3fa4f70046778c549f96c4ce3076683e60f44f4132ea6
                                                                • Instruction ID: bd11670455c467a44f2561b81852e7dd4e5dc52bf099ecd14a6b8fc66e242b98
                                                                • Opcode Fuzzy Hash: f1897e6f69eb396191c3fa4f70046778c549f96c4ce3076683e60f44f4132ea6
                                                                • Instruction Fuzzy Hash: 661133B58003489FDB10DF99C884BDFBBF8EB48324F14845AE519A7200C375A940CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,04F76C08,?,?,?,?), ref: 04F76C7D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: LongWindow
                                                                • String ID:
                                                                • API String ID: 1378638983-0
                                                                • Opcode ID: e92dc0dd3da39fdec53c40bcfd6e8502f1f3c8f7a4713cc6e33b452a8afd6c75
                                                                • Instruction ID: 1a80d7ed1c47ee326f66999c266a5653af14eef3439114843717f53c635615d7
                                                                • Opcode Fuzzy Hash: e92dc0dd3da39fdec53c40bcfd6e8502f1f3c8f7a4713cc6e33b452a8afd6c75
                                                                • Instruction Fuzzy Hash: E81133B59007489FEB10CF89C984BDEBFF8EB48324F10841AE819A7300C378A940CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ResumeThread.KERNELBASE(00000097), ref: 0298C2EF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: 8930371adf7c06dd3e0b9491c02dcd626bb7a377a771774e9a17fbf5a855c866
                                                                • Instruction ID: b8ea8673a3fb2f7d748b874f3aac68f9df2a1402fa3fbe814f2f04f94e96548a
                                                                • Opcode Fuzzy Hash: 8930371adf7c06dd3e0b9491c02dcd626bb7a377a771774e9a17fbf5a855c866
                                                                • Instruction Fuzzy Hash: 0A1103B58002898FCB10DF9AD444BDEBFF4AF48324F15846AD559A7350D375A544CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,04F76C08,?,?,?,?), ref: 04F76C7D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: LongWindow
                                                                • String ID:
                                                                • API String ID: 1378638983-0
                                                                • Opcode ID: f911cb181f0c684c1f7b0a2564170e5ab4f9ef045bad749d2d6b775d91957386
                                                                • Instruction ID: fc7d3be498ff7292c7f794e5bf7145d71a3fe0d64154d70f42ee299b7c463ae1
                                                                • Opcode Fuzzy Hash: f911cb181f0c684c1f7b0a2564170e5ab4f9ef045bad749d2d6b775d91957386
                                                                • Instruction Fuzzy Hash: 641133B58006488FEB10CF89D884BDFBBF8EB48324F14841AE819A7700C378A940CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ResumeThread.KERNELBASE(00000097), ref: 0298C2EF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: ea7e51cc4006cb0621dbc2ad21222f380c93b4dfb5221134d4500f8d204e9f04
                                                                • Instruction ID: b836065777041f4072c7709c9be515be27de72a84221fb8a10fdc6b256ff179a
                                                                • Opcode Fuzzy Hash: ea7e51cc4006cb0621dbc2ad21222f380c93b4dfb5221134d4500f8d204e9f04
                                                                • Instruction Fuzzy Hash: F01112B58002898FCB10DF9AC884BDEBBF8EB48324F14845AE519B7240C775A944CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 04F70286
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: e865b4d31e1a0324ccd3e944e64d3fa8b503cc00d0f75530e24f1db805211793
                                                                • Instruction ID: 4dd13df61aafaa84cbd6edf010b0f2527447abe36ec9442d81c2c5d91c0bda74
                                                                • Opcode Fuzzy Hash: e865b4d31e1a0324ccd3e944e64d3fa8b503cc00d0f75530e24f1db805211793
                                                                • Instruction Fuzzy Hash: 3BF05E768083848EDB61CB9994443CEBFB1EF16214F05858BC59967552CB3C6155CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656978485.0000000000E9D000.00000040.00000001.sdmp, Offset: 00E9D000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6b955226d88d8a825a14c07a108830d6fa4001db577172722606236a0f6695f8
                                                                • Instruction ID: 27eb4b96478a35c5e78b9edf5a1bae4437a75366465c6aa5cf2b1a3cac38109b
                                                                • Opcode Fuzzy Hash: 6b955226d88d8a825a14c07a108830d6fa4001db577172722606236a0f6695f8
                                                                • Instruction Fuzzy Hash: 752167B1508240EFDF01DF14DCC0B66BF65FB94328F258669E9055B246C336D856CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656995378.0000000000EAD000.00000040.00000001.sdmp, Offset: 00EAD000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4557cd6cdca8c454a4ac6845a561459af464f69fb794671ddbd454b5a61a2ef9
                                                                • Instruction ID: 439caa69ab0810846ba423045313c8171b27bec976b51aa53474bf40536968ea
                                                                • Opcode Fuzzy Hash: 4557cd6cdca8c454a4ac6845a561459af464f69fb794671ddbd454b5a61a2ef9
                                                                • Instruction Fuzzy Hash: DA2107B1508244EFDB00DF10DCC0B56BB65FB59318F24CAA9D90A5F646C776E846CAA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656995378.0000000000EAD000.00000040.00000001.sdmp, Offset: 00EAD000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 818de02a1f76a460319d74869196a92aeb07c3f9e268c99e0f1dc0d6b07a917d
                                                                • Instruction ID: 622fdf7ed72c2103675c5ce1de1767aaa93a5a3989e164f786a7a79f2c21d132
                                                                • Opcode Fuzzy Hash: 818de02a1f76a460319d74869196a92aeb07c3f9e268c99e0f1dc0d6b07a917d
                                                                • Instruction Fuzzy Hash: 142137B1508240EFDB00CF10D9C0B66BB65FB89318F24C6A9D94A5F666C736E806CA71
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656978485.0000000000E9D000.00000040.00000001.sdmp, Offset: 00E9D000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 987ae082b2f359035be596b84dcad585c5d9c7b80c54fd1badd6de72d9b1f1a2
                                                                • Instruction ID: f103e5a5a6aebcf0120f32e5636dae26d692a44576d6993e89606cb52c03c657
                                                                • Opcode Fuzzy Hash: 987ae082b2f359035be596b84dcad585c5d9c7b80c54fd1badd6de72d9b1f1a2
                                                                • Instruction Fuzzy Hash: 0C11D376408280DFDF02CF14D9C4B16BF72FB94328F24C6A9D8495B616C33AD856CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656995378.0000000000EAD000.00000040.00000001.sdmp, Offset: 00EAD000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 84522397b0c0072479584b34e9b527c289f971b5c41eac134402e64a3c6926ae
                                                                • Instruction ID: 1d53ed7008f95ee5586d372545fb0a67d62ece12964f439c2d986f9c22985dbe
                                                                • Opcode Fuzzy Hash: 84522397b0c0072479584b34e9b527c289f971b5c41eac134402e64a3c6926ae
                                                                • Instruction Fuzzy Hash: 6111BE75908280DFDB01CF10D9C4B15FB71FB89328F24C6A9D8494B666C33AE85ACB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656995378.0000000000EAD000.00000040.00000001.sdmp, Offset: 00EAD000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 84522397b0c0072479584b34e9b527c289f971b5c41eac134402e64a3c6926ae
                                                                • Instruction ID: 44a820bb8b98bfedc00e1c06b3f86e0e72b877c02afffe33e4d0d2161d3a25c8
                                                                • Opcode Fuzzy Hash: 84522397b0c0072479584b34e9b527c289f971b5c41eac134402e64a3c6926ae
                                                                • Instruction Fuzzy Hash: 81118E75509280DFDB01CF10D9C4B15BBB1FB59318F24C6A9D8494F656C33AE85ACB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656978485.0000000000E9D000.00000040.00000001.sdmp, Offset: 00E9D000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7f17772784f1a77b2a7cbf5082e492df49d208c7810e09148a0f51b87fadc5c1
                                                                • Instruction ID: 6b6b85c156a45aa8ee033b4b093124c92a4c039ca4b8ebf93209929d692e9a00
                                                                • Opcode Fuzzy Hash: 7f17772784f1a77b2a7cbf5082e492df49d208c7810e09148a0f51b87fadc5c1
                                                                • Instruction Fuzzy Hash: 96012B7140C3A0AAEB104E51CCC4BE6BB98EF4133CF18D51BEE046B246C3799C44CAB1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.656978485.0000000000E9D000.00000040.00000001.sdmp, Offset: 00E9D000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: aa42fc0a500612dcf4ccf90c87e08057eb640637629b7dc13778c6d0b777faac
                                                                • Instruction ID: 411e25845ef54f52e2f7853018661bf1c281ee2b78f2b8ae88ec65c28fcf34b5
                                                                • Opcode Fuzzy Hash: aa42fc0a500612dcf4ccf90c87e08057eb640637629b7dc13778c6d0b777faac
                                                                • Instruction Fuzzy Hash: C9F09C71408354AEEB108E55CCC4B62FF98EB91738F18C45BED085B286C3799C44CAB1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Non-executed Functions

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: >?Ln$JJs5$JJs5$JJs5
                                                                • API String ID: 0-3768381005
                                                                • Opcode ID: 5a06369c9231f3c2f2afa005dba968241d231aa7b152348605a7001c7dda677b
                                                                • Instruction ID: 6e612b50462fca52945166bd16a5a571f38dc6136d9dd61b79085131a95f4f4d
                                                                • Opcode Fuzzy Hash: 5a06369c9231f3c2f2afa005dba968241d231aa7b152348605a7001c7dda677b
                                                                • Instruction Fuzzy Hash: 9A61B075E052198FCB04CFAAC5815EEFBF2EF88210F28956AE915B7314D3349A45CB68
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: >?Ln$JJs5$JJs5$JJs5
                                                                • API String ID: 0-3768381005
                                                                • Opcode ID: c3bd7e709459205c7efc2a926bae6971e963f818e101dde5e9186e8adb2a53e3
                                                                • Instruction ID: 509220a02bfa1e52faf455a6748d1e60a15b36e5173fb74828fad4f9a96d0062
                                                                • Opcode Fuzzy Hash: c3bd7e709459205c7efc2a926bae6971e963f818e101dde5e9186e8adb2a53e3
                                                                • Instruction Fuzzy Hash: E261B174E0560A8FCB04CFA9C5805DEFBF2FF89210F2894AAD915B7324D3349A46CB58
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D0l$R>e$lbG
                                                                • API String ID: 0-3968366382
                                                                • Opcode ID: f388d818d920a620b04c58f5998e456fa7e61ec5b02385c7271cf5c0c28f43d5
                                                                • Instruction ID: 52a1c7882f9d4493865081c03aedc8f1d21a71fa68659fc75e2873b47a41780e
                                                                • Opcode Fuzzy Hash: f388d818d920a620b04c58f5998e456fa7e61ec5b02385c7271cf5c0c28f43d5
                                                                • Instruction Fuzzy Hash: 9DD19E71E0420A8BCF04EFB9D5416AEBBF6FF89314F18842AC516AB344EB759941CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: "@[i$Iqlo
                                                                • API String ID: 0-4270939087
                                                                • Opcode ID: 7836984d12547150e42de3053502871e907143f062a159a32c94ad517f71b9ae
                                                                • Instruction ID: 9b919d4d87d2ff8e421ddb34a65ed1d2c929ed58433a130f79e573ea6ef95ff4
                                                                • Opcode Fuzzy Hash: 7836984d12547150e42de3053502871e907143f062a159a32c94ad517f71b9ae
                                                                • Instruction Fuzzy Hash: FA71E974D0520ACFDB08DFA5D5815AEBBB2FF89300F18982AD419BB354E7349A02CF95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: "@[i$Iqlo
                                                                • API String ID: 0-4270939087
                                                                • Opcode ID: b6e795e4044ce722d797e3b1e13183fc632c06e9cedc7dc1ab389e4fe5fee365
                                                                • Instruction ID: 565c46d9c4e3b20d573f8d17eedebb7acbf44015ad5e8081558c932586412e08
                                                                • Opcode Fuzzy Hash: b6e795e4044ce722d797e3b1e13183fc632c06e9cedc7dc1ab389e4fe5fee365
                                                                • Instruction Fuzzy Hash: B271D974E0520ACFDB08DFA5D5805AEBBB2FF89300F18942AD419BB354D7349A16CF95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: [wO($[wO(
                                                                • API String ID: 0-3531625925
                                                                • Opcode ID: 4dc05140624f2d044085cba1ef2da8d4308c6eefa5895ea1f31de11806676175
                                                                • Instruction ID: 2ac18c01c175efcd0befac1da8a58af258a52bb55d6b65c54033775cce9e8841
                                                                • Opcode Fuzzy Hash: 4dc05140624f2d044085cba1ef2da8d4308c6eefa5895ea1f31de11806676175
                                                                • Instruction Fuzzy Hash: D461F670E15219DFCB04DFA9D5808AEFBF2FB88700F2895A6D409A7315D730A942CF69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: R.
                                                                • API String ID: 0-360849638
                                                                • Opcode ID: 02075991f37ec1390d5bc60f87863096f372a901625287b2b0120f47c1c0ab4c
                                                                • Instruction ID: 32121d775d6bee7c7beac2dd0ffe6a2119fd0462a01e38b9d5711cc0f406aad9
                                                                • Opcode Fuzzy Hash: 02075991f37ec1390d5bc60f87863096f372a901625287b2b0120f47c1c0ab4c
                                                                • Instruction Fuzzy Hash: 8B710970E15219CFDB14DFA9D980A9DFBB2FF89204F25C1A9D508AB315DB309A45CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: F|?`
                                                                • API String ID: 0-3619422893
                                                                • Opcode ID: cf2c1e7a7d06d68cc0893bd7005c9d56572c1fff7ad9065a1ca63380b369fc02
                                                                • Instruction ID: 9cb1e3ea8be325376cfb9ea2ba3a3516290ccff8db6e462867c2fc24db91b45e
                                                                • Opcode Fuzzy Hash: cf2c1e7a7d06d68cc0893bd7005c9d56572c1fff7ad9065a1ca63380b369fc02
                                                                • Instruction Fuzzy Hash: 4A41F970E0460A9FDB04DFAAC4815AEFBF2FF88600F18D56AC415A7254D7349A42CF98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID: F|?`
                                                                • API String ID: 0-3619422893
                                                                • Opcode ID: 35c60d24a1aa89f39a9d355f0ceb7904d333b111f5c7c13ba46e53cc4761ea30
                                                                • Instruction ID: f8120c7ff5cfb64e1e26e6e7c46f04f84f52b86296e2c0a73e533cc36f3b5c4a
                                                                • Opcode Fuzzy Hash: 35c60d24a1aa89f39a9d355f0ceb7904d333b111f5c7c13ba46e53cc4761ea30
                                                                • Instruction Fuzzy Hash: E241E6B0E0460A9FDB48DFAAC5815AEFBF2FF88700F24D569C415A7254E7349A41CF98
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 73eadd153a1b93c25a91c13278078a117462adb58e5bc1348eeac526576e168a
                                                                • Instruction ID: 66c346d9c5ad2d4cf5d35452ee6cfb4f3599022fc3c701caf7b8ad62c7ae927c
                                                                • Opcode Fuzzy Hash: 73eadd153a1b93c25a91c13278078a117462adb58e5bc1348eeac526576e168a
                                                                • Instruction Fuzzy Hash: 43D1BE317003518FEB2AEB75C420BAE77E6AF88704F58446ED146DB690DB35EA02CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 478108105d63faa21e71b27fb84e52b56555d0c6b0412e8bb5adddfe19aa6687
                                                                • Instruction ID: 30a704ade617d1b79ca9ebd0454cae65138c686aa28942112536a0742e065cbb
                                                                • Opcode Fuzzy Hash: 478108105d63faa21e71b27fb84e52b56555d0c6b0412e8bb5adddfe19aa6687
                                                                • Instruction Fuzzy Hash: F912B2F1C11746AAE330EF65EC981D93BA1F745328F904228D2E13AAD9D7BE114ACF44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 598c225634e8a8822c463e72b3c09e5c321c14da67ac6d67807e85d76d6c1fb3
                                                                • Instruction ID: 3c89acc5b081782943efaa744507238262e8173496a43cdc90aa3e3b0b4e71b5
                                                                • Opcode Fuzzy Hash: 598c225634e8a8822c463e72b3c09e5c321c14da67ac6d67807e85d76d6c1fb3
                                                                • Instruction Fuzzy Hash: 52A17036E002198FCF05DFB5C8449DEBBB2FF85304B1585AAE905BB264EB35A946CF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.661454185.0000000004F70000.00000040.00000001.sdmp, Offset: 04F70000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3e2163dffd38cd504aa245cfccb402d5df556da7dca2de93efaa07ee5514e7d5
                                                                • Instruction ID: fb7a7dafd143ef12b63dc5bac309dc00148b2a183ec3b34c3f1fa312aedda821
                                                                • Opcode Fuzzy Hash: 3e2163dffd38cd504aa245cfccb402d5df556da7dca2de93efaa07ee5514e7d5
                                                                • Instruction Fuzzy Hash: 7DC126B1D117469BE720EF65EC881D97BB1FB85328F504228D2A17B6D8D7BE104ACF84
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5c7671d24ebe70f3bc5ee2b7f034f2061a00e9676aad48c8301285e257ecc53f
                                                                • Instruction ID: 71cb5a846636086a72bcd4efd41cff761e670ff82fa754d5d21267f76630cfa5
                                                                • Opcode Fuzzy Hash: 5c7671d24ebe70f3bc5ee2b7f034f2061a00e9676aad48c8301285e257ecc53f
                                                                • Instruction Fuzzy Hash: CA610970E05219DFCB05DFA9D5808AEFBF2FF88600F1894A6D409A7315D330A942CB69
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8e8652bd453ba9159b062e11069d3f3fd6dcccd8446ee6406d3efbdd31844ae6
                                                                • Instruction ID: ec357f0678da4399beb352444ccccdf7ac3e53741c3602c8c03984ebe7a4677e
                                                                • Opcode Fuzzy Hash: 8e8652bd453ba9159b062e11069d3f3fd6dcccd8446ee6406d3efbdd31844ae6
                                                                • Instruction Fuzzy Hash: 31512A71E5061A8BDB64DF66C8407DDBBB2FBC8300F1885AAC50DA7614EB705AC18F40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8318fb80c30bbc92c5c70414e6624ef0726acbd8272198afdb65b074b01bb222
                                                                • Instruction ID: 5c9718f44356aeac03180993d1f9ea9e0304c38e00e396b6832035184798eb3b
                                                                • Opcode Fuzzy Hash: 8318fb80c30bbc92c5c70414e6624ef0726acbd8272198afdb65b074b01bb222
                                                                • Instruction Fuzzy Hash: 2D411B71E0560ADFCB44DFAAC5415AEFBF2FF88300F24C4AAC415A7255E7319A42CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c99e11cdb981fe9a8c5a04d6fee12bbd0270b4619dd9846ac7055a81f16b50a5
                                                                • Instruction ID: f5b8773f8dc649c522e960252407287eaa380c575f9523d79ed22ff03263f570
                                                                • Opcode Fuzzy Hash: c99e11cdb981fe9a8c5a04d6fee12bbd0270b4619dd9846ac7055a81f16b50a5
                                                                • Instruction Fuzzy Hash: 1B410971E5161A8BDB68CF6AC8447D9BBF2FFC9300F1482AAD408A7614EB705AC59F40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7f0dd689de0f8376cb5ab1ad410c994180775f46a45a0c78acc0252c5d9a7644
                                                                • Instruction ID: 25075ee0c35c72d575ebf3f7e1d055dce7359db6be08466f0fb9a92b8e38b8b4
                                                                • Opcode Fuzzy Hash: 7f0dd689de0f8376cb5ab1ad410c994180775f46a45a0c78acc0252c5d9a7644
                                                                • Instruction Fuzzy Hash: 9A41F870E0560ADBCB44DFAAC5815AEFBF2FF88300F24D46AC515A7214E7359A42CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 79aaebee09d6c153603d69e489fbcf33caf8d86ba6bab12fe209b205fee710fd
                                                                • Instruction ID: cc197760a27330d8968e5ccbe40c10ed21938b3a946df203c479cc621ce1d792
                                                                • Opcode Fuzzy Hash: 79aaebee09d6c153603d69e489fbcf33caf8d86ba6bab12fe209b205fee710fd
                                                                • Instruction Fuzzy Hash: AF11ECB1E016199BEB58DFABD84069EFBF7AFCC200F18C07AC908A6218EB3405458F51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.657208164.0000000002980000.00000040.00000001.sdmp, Offset: 02980000, based on PE: false
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f943f0b60a7576becaa8f038a5ebb07627acb033cfccef327befc630b72d6934
                                                                • Instruction ID: 18861eb97d520f76bec262d141074c7080234ebe79c64ad8a6956505974bf71a
                                                                • Opcode Fuzzy Hash: f943f0b60a7576becaa8f038a5ebb07627acb033cfccef327befc630b72d6934
                                                                • Instruction Fuzzy Hash: 8811C171E016199BEB5CDF6BD94469EFBF3AFCC200F18C079C518A6258EB3445468F51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Executed Functions

                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 027DB730
                                                                • GetCurrentThread.KERNEL32 ref: 027DB76D
                                                                • GetCurrentProcess.KERNEL32 ref: 027DB7AA
                                                                • GetCurrentThreadId.KERNEL32 ref: 027DB803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID: H
                                                                • API String ID: 2063062207-1105002124
                                                                • Opcode ID: 0ee7eb266eb43a341704905369bed3b5384496db0f6f55a319dbc7f91dcd5e26
                                                                • Instruction ID: 81a3d181a2d11968a3345c2c1593987da400c5e97084a592b2746ebd32ac3be8
                                                                • Opcode Fuzzy Hash: 0ee7eb266eb43a341704905369bed3b5384496db0f6f55a319dbc7f91dcd5e26
                                                                • Instruction Fuzzy Hash: B25177B4E043498FDB10CFA9C6487EEBBF1AF48318F24846AE049A7390CB349845CF65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 027DB730
                                                                • GetCurrentThread.KERNEL32 ref: 027DB76D
                                                                • GetCurrentProcess.KERNEL32 ref: 027DB7AA
                                                                • GetCurrentThreadId.KERNEL32 ref: 027DB803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID: H
                                                                • API String ID: 2063062207-1105002124
                                                                • Opcode ID: 207e129d05e22398df5f068ad6602d16b65ad0d0152796fd8b60071a137bbc6f
                                                                • Instruction ID: 27407cada3a29c2b04e9fe6cd07168fd3b20b664296edf3edf133a885bbca6c6
                                                                • Opcode Fuzzy Hash: 207e129d05e22398df5f068ad6602d16b65ad0d0152796fd8b60071a137bbc6f
                                                                • Instruction Fuzzy Hash: AE5146B4E042498FDB10CFAAD648BDEBBF1BF88318F25846AE059A7350C7745844CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027DFD0A
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 4e8de3c07523a8fab82bdded46e444bf4fbc0d8b8a23875c771e87934b86bfad
                                                                • Instruction ID: 8b4257ce363123e8c7e5fc0eb273ed8c4b9e5cb8ffaef24c23eb953cd792a93d
                                                                • Opcode Fuzzy Hash: 4e8de3c07523a8fab82bdded46e444bf4fbc0d8b8a23875c771e87934b86bfad
                                                                • Instruction Fuzzy Hash: FC9183719093999FCB02CFA5C894ADDBFB1EF4A314F1881AAE8449F263C734944ADF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 027D962E
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: f908895212e1c147bf5df47e48c68fd8c900694d83f121161d921ea8ca419edd
                                                                • Instruction ID: 4edf3cb6686001f93e55107560bc66e8a41d74d25783badeda722b4e9f69eb92
                                                                • Opcode Fuzzy Hash: f908895212e1c147bf5df47e48c68fd8c900694d83f121161d921ea8ca419edd
                                                                • Instruction Fuzzy Hash: 39711370A00B058FDB64DF6AC45479ABBF1BF88314F008A2ED58AD7A50DB75E806CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027DFD0A
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 1306139b40acedbabf975abed65b571537704950ef21490d3706619ba67a095d
                                                                • Instruction ID: 410cedd4737adfab176db90284c2f6ed4696c0f1f03d4a69df2c19fab6116f42
                                                                • Opcode Fuzzy Hash: 1306139b40acedbabf975abed65b571537704950ef21490d3706619ba67a095d
                                                                • Instruction Fuzzy Hash: 6941C0B1D003099FDF14CFAAD884ADEBBB5FF48314F24852AE819AB210D7749845CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027DBD87
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 043175410fc81c11ce3e6d0685d2024c538f420321363d502b981e8a648ae360
                                                                • Instruction ID: 1f35dc8ab0dbf07f0a88148585d12643e3151abe25551ca438934caf66639cf4
                                                                • Opcode Fuzzy Hash: 043175410fc81c11ce3e6d0685d2024c538f420321363d502b981e8a648ae360
                                                                • Instruction Fuzzy Hash: 91416E74A44344DFE702AF72E964BAE7BB1FB89701F14422AE9455F395CB754806CF20
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027DBD87
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 3ce51ef6e759878d9b6874373583e25a4a409e4833c34b57051e65b5ec2da250
                                                                • Instruction ID: 7f51b15dbd4d4b369fc8b75295e746a36a2f7cbcdc26da8f64387316d58ff668
                                                                • Opcode Fuzzy Hash: 3ce51ef6e759878d9b6874373583e25a4a409e4833c34b57051e65b5ec2da250
                                                                • Instruction Fuzzy Hash: 1F21E3B59002499FDB10CFAAD584BDEBFF4EF48324F15842AE954B3210C378A955CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 027DBD87
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: ab76e7012e5e0640df2349169025f6f2822a2bb1667cb62fe181da0427c9e0f0
                                                                • Instruction ID: 0ecd465adffd13af3336b27afba2f2b24d1c689d412b52c865fb4894a9951ddd
                                                                • Opcode Fuzzy Hash: ab76e7012e5e0640df2349169025f6f2822a2bb1667cb62fe181da0427c9e0f0
                                                                • Instruction Fuzzy Hash: B521C4B59002499FDB10CFAAD584BDEBFF8FB48324F15842AE954A3310D778A954CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,027D96A9,00000800,00000000,00000000), ref: 027D98BA
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 60b63b75699edffa60918cbb771e41c1198725158e95f1ffb0aaae3604e5887c
                                                                • Instruction ID: 346354ba8b33ef27ee05871264edaee3bc8a3e506cd0825e8e0f7b710ada2282
                                                                • Opcode Fuzzy Hash: 60b63b75699edffa60918cbb771e41c1198725158e95f1ffb0aaae3604e5887c
                                                                • Instruction Fuzzy Hash: A61100B6900249DFDB10CF9AC444BDEBBF4EB88724F05842EE519A7600C775A945CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,027D96A9,00000800,00000000,00000000), ref: 027D98BA
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 53468cba79eb44249dfe0f39556ec57e7eaaa281f738bbfa93e9db02119beaae
                                                                • Instruction ID: a9b9ff6c376cf1548c9bfc0f5c93f4e2ce0c77dfd12587882d999e35c29a29ce
                                                                • Opcode Fuzzy Hash: 53468cba79eb44249dfe0f39556ec57e7eaaa281f738bbfa93e9db02119beaae
                                                                • Instruction Fuzzy Hash: F3110DB6900249CFDB10CFAAD444BDEBBF5AB88324F05842ED959A7200C778A945CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 027D962E
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: a7cb3de484f2ec7364a1f5a16283180c6806ec286a521548a4bec91dcc71bdef
                                                                • Instruction ID: 55d492e0b43208d0a4b7d5586ced1841ee8930d42bb61a4545b9496f3c7c75bd
                                                                • Opcode Fuzzy Hash: a7cb3de484f2ec7364a1f5a16283180c6806ec286a521548a4bec91dcc71bdef
                                                                • Instruction Fuzzy Hash: 7211DFB5D006898FDB10CF9AC444BDEFBF4EF88224F15842AD559A7600C779A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetWindowLongW.USER32(?,?,?), ref: 027DFE9D
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: LongWindow
                                                                • String ID:
                                                                • API String ID: 1378638983-0
                                                                • Opcode ID: 87e775bace3d5517d7f98ed2e36c1f3779af9ec12cb7d780ca0bfbf484a1931b
                                                                • Instruction ID: ebf24044540b729b2fa24028c49282881d35fd0c4f736d1b4e55a2056fb82e1e
                                                                • Opcode Fuzzy Hash: 87e775bace3d5517d7f98ed2e36c1f3779af9ec12cb7d780ca0bfbf484a1931b
                                                                • Instruction Fuzzy Hash: BB1133B59002498FDB10CF99C884BDEBBF8EB48324F14845AD859A7741C374A945CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetWindowLongW.USER32(?,?,?), ref: 027DFE9D
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.904705239.00000000027D0000.00000040.00000001.sdmp, Offset: 027D0000, based on PE: false
                                                                Similarity
                                                                • API ID: LongWindow
                                                                • String ID:
                                                                • API String ID: 1378638983-0
                                                                • Opcode ID: 0ac1ea1b4bba1eab1ee00ea8966d2ab955d06d6f6bfc1ac258735ed1d48b39e4
                                                                • Instruction ID: f37afb5d7d42470b7659004c134ac2a7ef75f7f56d0f46ffef1005fcbe2de4eb
                                                                • Opcode Fuzzy Hash: 0ac1ea1b4bba1eab1ee00ea8966d2ab955d06d6f6bfc1ac258735ed1d48b39e4
                                                                • Instruction Fuzzy Hash: 901112B59002499FDB10CF9AD585BDFFBF8EB48324F10841AE859A3700C374A944CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Non-executed Functions