Loading ...

Play interactive tourEdit tour

Analysis Report NEW_ORDER.pdf.exe

Overview

General Information

Sample Name:NEW_ORDER.pdf.exe
Analysis ID:383990
MD5:5e618064ece7e7ae38af0dc9aa5a5559
SHA1:9114a9bad82d1430dddadc38e05759782ae166bc
SHA256:f0e948526717e90fe4de5a54a4c2e7b1d80e9e7074ba989292c69e9f67a52a1e
Tags:NanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NEW_ORDER.pdf.exe (PID: 5416 cmdline: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' MD5: 5E618064ECE7E7AE38AF0DC9AA5A5559)
    • schtasks.exe (PID: 5492 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5076 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xa8d5d:$x1: NanoCore.ClientPluginHost
  • 0xdbd9d:$x1: NanoCore.ClientPluginHost
  • 0xa8d9a:$x2: IClientNetworkHost
  • 0xdbdda:$x2: IClientNetworkHost
  • 0xac8cd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0xdf90d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xa8ac5:$a: NanoCore
    • 0xa8ad5:$a: NanoCore
    • 0xa8d09:$a: NanoCore
    • 0xa8d1d:$a: NanoCore
    • 0xa8d5d:$a: NanoCore
    • 0xdbb05:$a: NanoCore
    • 0xdbb15:$a: NanoCore
    • 0xdbd49:$a: NanoCore
    • 0xdbd5d:$a: NanoCore
    • 0xdbd9d:$a: NanoCore
    • 0xa8b24:$b: ClientPlugin
    • 0xa8d26:$b: ClientPlugin
    • 0xa8d66:$b: ClientPlugin
    • 0xdbb64:$b: ClientPlugin
    • 0xdbd66:$b: ClientPlugin
    • 0xdbda6:$b: ClientPlugin
    • 0xa8c4b:$c: ProjectData
    • 0xdbc8b:$c: ProjectData
    • 0x199991:$c: ProjectData
    • 0x2179b1:$c: ProjectData
    • 0xa9652:$d: DESCrypto
    00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 16 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      4.2.RegSvcs.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      4.2.RegSvcs.exe.6230000.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      Click to see the 31 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5076, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' , ParentImage: C:\Users\user\Desktop\NEW_ORDER.pdf.exe, ParentProcessId: 5416, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp', ProcessId: 5492

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: NEW_ORDER.pdf.exeAvira: detected
      Antivirus detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeAvira: detection malicious, Label: HEUR/AGEN.1138557
      Found malware configurationShow sources
      Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeReversingLabs: Detection: 31%
      Multi AV Scanner detection for submitted fileShow sources
      Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 31%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: NEW_ORDER.pdf.exeJoe Sandbox ML: detected
      Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.2.RegSvcs.exe.6230000.9.unpackAvira: Label: TR/NanoCore.fadte
      Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0E8B1660
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0E8B165F
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0E8B1714
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0E8B35B0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0E8B35C0

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: wealth2021.ddns.net
      Source: Malware configuration extractorURLs: 185.140.53.138
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: wealth2021.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49721 -> 185.140.53.138:20221
      Source: Joe Sandbox ViewIP Address: 185.140.53.138 185.140.53.138
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownDNS traffic detected: queries for: wealth2021.ddns.net
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmp, NEW_ORDER.pdf.exe, 00000000.00000002.223565195.0000000002521000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4
      Source: NEW_ORDER.pdf.exeString found in binary or memory: http://tempuri.org/GridOneHSDataSet.xsd
      Source: NEW_ORDER.pdf.exeString found in binary or memory: http://tempuri.org/HighScoresDataSet.xsd
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223374262.0000000000BA7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comm
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196181845.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196107574.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc9
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnIT
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnnte
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196438326.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com%
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196969332.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com2
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
      Source: RegSvcs.exe, 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.302a91c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.5830000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
      Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D76868 NtQueryInformationProcess,0_2_06D76868
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D76860 NtQueryInformationProcess,0_2_06D76860
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0098C2B00_2_0098C2B0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_009899900_2_00989990
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D77AD80_2_06D77AD8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D7C6E80_2_06D7C6E8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D766330_2_06D76633
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D754E00_2_06D754E0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D7CDB00_2_06D7CDB0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71ED90_2_06D71ED9
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71EE80_2_06D71EE8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D75E880_2_06D75E88
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D716A80_2_06D716A8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71A500_2_06D71A50
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D77A7C0_2_06D77A7C
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D75E790_2_06D75E79
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71A600_2_06D71A60
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D707D00_2_06D707D0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D707C00_2_06D707C0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D713980_2_06D71398
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D713880_2_06D71388
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D757B00_2_06D757B0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D757A00_2_06D757A0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D754D00_2_06D754D0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D720C80_2_06D720C8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D758F00_2_06D758F0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71C800_2_06D71C80
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D72C800_2_06D72C80
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D720BB0_2_06D720BB
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D758520_2_06D75852
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71C700_2_06D71C70
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D72C790_2_06D72C79
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D791F80_2_06D791F8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D78D0B0_2_06D78D0B
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B1E600_2_0E8B1E60
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B31880_2_0E8B3188
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0156E4714_2_0156E471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0156E4804_2_0156E480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0156BBD44_2_0156BBD4
      Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilename vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.233199984.000000000E480000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.233199984.000000000E480000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.221543576.000000000DB0D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEmptySafeHandle.exe4 vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223565195.0000000002521000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.233062357.000000000E390000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilenameEmptySafeHandle.exe4 vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.302a91c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.5830000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.5830000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: rrnBESjNXy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@13/1
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\cbbvUnffDoOkFzvkbCRnCsWpZ
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3148:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ae697278-0563-480d-a326-4f0ab2164ba0}
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3114.tmpJump to behavior
      Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
      Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 31%
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\NEW_ORDER.pdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\NEW_ORDER.pdf.exe 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: NEW_ORDER.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D72540 push C035BA79h; ret 0_2_06D72545
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B14B8 push ebp; retf 0_2_0E8B14C6
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B1510 push ebp; retf 0_2_0E8B151E
      Source: initial sampleStatic PE information: section name: .text entropy: 7.64783610174
      Source: initial sampleStatic PE information: section name: .text entropy: 7.64783610174
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Uses an obfuscated file name to hide its real file extension (double extension)Show sources
      Source: Possible double extension: pdf.exeStatic PE information: NEW_ORDER.pdf.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4029Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5596Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 939Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 6132Thread sleep time: -100842s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 5556Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 100842Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: RegSvcs.exe, 00000004.00000003.272286849.00000000013C2000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllaV7]
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FC3008Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'Jump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
      Source: RegSvcs.exe, 00000004.00000002.463173733.00000000030DF000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: RegSvcs.exe, 00000004.00000002.462901107.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RegSvcs.exe, 00000004.00000002.462901107.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: RegSvcs.exe, 00000004.00000002.464864352.00000000032B5000.00000004.00000001.sdmpBinary or memory string: Program ManagerU
      Source: RegSvcs.exe, 00000004.00000002.462901107.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: RegSvcs.exe, 00000004.00000002.463032101.0000000003023000.00000004.00000001.sdmpBinary or memory string: Program Managert
      Source: RegSvcs.exe, 00000004.00000002.463173733.00000000030DF000.00000004.00000001.sdmpBinary or memory string: Program Manager@ %
      Source: RegSvcs.exe, 00000004.00000002.463173733.00000000030DF000.00000004.00000001.sdmpBinary or memory string: Program Manager\
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Users\user\Desktop\NEW_ORDER.pdf.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Masquerading11Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information13Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      NEW_ORDER.pdf.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      NEW_ORDER.pdf.exe100%AviraHEUR/AGEN.1138557
      NEW_ORDER.pdf.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\rrnBESjNXy.exe100%AviraHEUR/AGEN.1138557
      C:\Users\user\AppData\Roaming\rrnBESjNXy.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\rrnBESjNXy.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      0.2.NEW_ORDER.pdf.exe.180000.0.unpack100%AviraHEUR/AGEN.1138557Download File
      0.0.NEW_ORDER.pdf.exe.180000.0.unpack100%AviraHEUR/AGEN.1138557Download File
      4.2.RegSvcs.exe.6230000.9.unpack100%AviraTR/NanoCore.fadteDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://tempuri.org/HighScoresDataSet.xsd0%Avira URL Cloudsafe
      http://www.founder.com.cn/cnIT0%Avira URL Cloudsafe
      http://www.fonts.comc0%URL Reputationsafe
      http://www.fonts.comc0%URL Reputationsafe
      http://www.fonts.comc0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.fonts.comc90%Avira URL Cloudsafe
      http://www.tiro.com20%Avira URL Cloudsafe
      http://www.founder.com.cn/cnnte0%Avira URL Cloudsafe
      http://tempuri.org/GridOneHSDataSet.xsd0%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      wealth2021.ddns.net0%Avira URL Cloudsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      185.140.53.1380%Avira URL Cloudsafe
      http://www.tiro.com%0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      wealth2021.ddns.net
      185.140.53.138
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        wealth2021.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        185.140.53.138true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://tempuri.org/HighScoresDataSet.xsdNEW_ORDER.pdf.exefalse
        • Avira URL Cloud: safe
        unknown
        http://www.apache.org/licenses/LICENSE-2.0NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersGNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cnITNEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers/?NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                high
                http://www.fonts.comcNEW_ORDER.pdf.exe, 00000000.00000003.196181845.000000000559B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/bTheNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fonts.comc9NEW_ORDER.pdf.exe, 00000000.00000003.196107574.000000000559B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.com2NEW_ORDER.pdf.exe, 00000000.00000003.196969332.000000000559B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers?NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cnnteNEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/GridOneHSDataSet.xsdNEW_ORDER.pdf.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4NEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssNEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpfalse
                        high
                        http://www.carterandcone.comlNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.commNEW_ORDER.pdf.exe, 00000000.00000002.223374262.0000000000BA7000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                              high
                              http://www.fonts.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmp, NEW_ORDER.pdf.exe, 00000000.00000002.223565195.0000000002521000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sakkal.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.tiro.com%NEW_ORDER.pdf.exe, 00000000.00000003.196438326.000000000559B000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.140.53.138
                                  wealth2021.ddns.netSweden
                                  209623DAVID_CRAIGGGtrue

                                  General Information

                                  Joe Sandbox Version:31.0.0 Emerald
                                  Analysis ID:383990
                                  Start date:08.04.2021
                                  Start time:13:45:13
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 7m 35s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Sample file name:NEW_ORDER.pdf.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:28
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@6/5@13/1
                                  EGA Information:Failed
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 93%
                                  • Number of executed functions: 61
                                  • Number of non-executed functions: 29
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                  • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.255.188.83, 104.43.139.144, 104.42.151.234, 13.64.90.137, 52.147.198.201, 20.82.210.154, 95.100.54.203, 23.10.249.43, 23.10.249.26, 20.54.26.129, 20.82.209.183
                                  • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/383990/sample/NEW_ORDER.pdf.exe

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  13:46:00API Interceptor1x Sleep call for process: NEW_ORDER.pdf.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  185.140.53.138NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                    Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                      URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                        Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                          1PH37n4Gva.exeGet hashmaliciousBrowse
                                            35dbds3GQG.exeGet hashmaliciousBrowse
                                              QXJGE2LOdP.exeGet hashmaliciousBrowse
                                                O4m3hDFNbh.exeGet hashmaliciousBrowse
                                                  nrv_remittance#U007eorder#U007epayment.exeGet hashmaliciousBrowse
                                                    NEW ORDER REQUEST_EXPORT005JKL DOC.exeGet hashmaliciousBrowse
                                                      WIRE COPY ORDER T104484_PP.exeGet hashmaliciousBrowse
                                                        71AXBkD1wA.exeGet hashmaliciousBrowse

                                                          Domains

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          wealth2021.ddns.netNEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138

                                                          ASN

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          DAVID_CRAIGGGsamples ordered 024791.exeGet hashmaliciousBrowse
                                                          • 185.140.53.69
                                                          PO.20210704_quick shipment.exeGet hashmaliciousBrowse
                                                          • 185.140.53.69
                                                          ANS_309487487_#049844874.exeGet hashmaliciousBrowse
                                                          • 185.140.53.9
                                                          tmp2.exeGet hashmaliciousBrowse
                                                          • 185.140.53.71
                                                          tmp.exeGet hashmaliciousBrowse
                                                          • 185.140.53.71
                                                          NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          Doc_58YJ54-521DERG701-55YH701.exeGet hashmaliciousBrowse
                                                          • 185.140.53.230
                                                          Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          FRQ_05694 revised quantity.exeGet hashmaliciousBrowse
                                                          • 185.140.53.69
                                                          INVOICE 15112021.xlsxGet hashmaliciousBrowse
                                                          • 185.140.53.130
                                                          URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          IMG-001982-AW00173-SSE73I.exeGet hashmaliciousBrowse
                                                          • 185.140.53.230
                                                          FYI-Orderimg.exeGet hashmaliciousBrowse
                                                          • 185.140.53.67
                                                          Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          PO-94765809570-Order pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.7
                                                          Commercial E-invoice.exeGet hashmaliciousBrowse
                                                          • 185.140.53.137
                                                          Order23032021.xlsGet hashmaliciousBrowse
                                                          • 185.140.53.130
                                                          ZcQwvgqtuQ.exeGet hashmaliciousBrowse
                                                          • 91.193.75.245
                                                          lKIPqaYkKB.exeGet hashmaliciousBrowse
                                                          • 185.140.53.161
                                                          t5R60D503x.exeGet hashmaliciousBrowse
                                                          • 185.140.53.9

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          No context

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW_ORDER.pdf.exe.log
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):1314
                                                          Entropy (8bit):5.350128552078965
                                                          Encrypted:false
                                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                          C:\Users\user\AppData\Local\Temp\tmp3114.tmp
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1643
                                                          Entropy (8bit):5.19287247519914
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGtn:cbh47TlNQ//rydbz9I3YODOLNdq3m
                                                          MD5:FD0EA8856B93E3C828C355804744440B
                                                          SHA1:E5D6AF389AF533573C6EC5624689B47B770B07BA
                                                          SHA-256:92C34996FB6228C10EE9CAF86A7E587A86EA7BE16E950B16FEE28A908DC97D92
                                                          SHA-512:B6951FA8D9B35D1565779880B73B36554AB5038871D38FDEB3B5E5A282A23B1F7FA223D0B155F429D4F0147BC471AD736A3C7CE9BDE4C007F4FD2329BEDDC861
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          File Type:Non-ISO extended-ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):3.0
                                                          Encrypted:false
                                                          SSDEEP:3:RP:J
                                                          MD5:340C851A07E7700F5198DD6F64611971
                                                          SHA1:D1A54C13DC89534A62F192EC86B6732F0A390348
                                                          SHA-256:2E97838358183765F2BEBE5B6A1DEC4671CD93FFFCA77E0A000B769F7C3EF1FC
                                                          SHA-512:6C8DEAA86143F46FAA4E49B5E6BB8C157F76AB9F3CA6ADAFB6CEFA579882142F879811F2197014C9A3F591DC440AACDD236E6EA522067B6871F0A55F52C9726E
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: p..W...H
                                                          C:\Users\user\AppData\Roaming\rrnBESjNXy.exe
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):695808
                                                          Entropy (8bit):7.638906088572277
                                                          Encrypted:false
                                                          SSDEEP:12288:4+2SinV2hLEPkhB8AB6pTQwa0WCsLy81giSkKBNLvCfMnjjvUPb:4+2Si8hWkHuFQwJaUVJ3UPb
                                                          MD5:5E618064ECE7E7AE38AF0DC9AA5A5559
                                                          SHA1:9114A9BAD82D1430DDDADC38E05759782AE166BC
                                                          SHA-256:F0E948526717E90FE4DE5A54A4C2E7B1D80E9E7074BA989292C69E9F67A52A1E
                                                          SHA-512:309D7A67808449578426DED36AA1C972F6DBE9A26EEC0969ECB75F98351C40A0DC113D1A2505F931004EAA8E92FC32F5BEE0CA114685EA0BF1411AC0A0D54075
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 31%
                                                          Reputation:low
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Xn`..............P.............J.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................,.......H.......|...Do..............8............................................0............(,...(-.........(.....o.....*.....................(/......(0......(1......(2......(3....*N..(....oK...(4....*&..(5....*.s6........s7........s8........s9........s:........*....0...........~....o;....+..*.0...........~....o<....+..*.0...........~....o=....+..*.0...........~....o>....+..*.0...........~....o?....+..*&..(@....*...0..<........~.....(A.....,!r...p.....(B...oC...sD............~.....
                                                          C:\Users\user\AppData\Roaming\rrnBESjNXy.exe:Zone.Identifier
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview: [ZoneTransfer]....ZoneId=0

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.638906088572277
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Windows Screen Saver (13104/52) 0.07%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:NEW_ORDER.pdf.exe
                                                          File size:695808
                                                          MD5:5e618064ece7e7ae38af0dc9aa5a5559
                                                          SHA1:9114a9bad82d1430dddadc38e05759782ae166bc
                                                          SHA256:f0e948526717e90fe4de5a54a4c2e7b1d80e9e7074ba989292c69e9f67a52a1e
                                                          SHA512:309d7a67808449578426ded36aa1c972f6dbe9a26eec0969ecb75f98351c40a0dc113d1a2505f931004eaa8e92fc32f5bee0ca114685ea0bf1411ac0a0d54075
                                                          SSDEEP:12288:4+2SinV2hLEPkhB8AB6pTQwa0WCsLy81giSkKBNLvCfMnjjvUPb:4+2Si8hWkHuFQwJaUVJ3UPb
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Xn`..............P.............J.... ........@.. ....................................@................................

                                                          File Icon

                                                          Icon Hash:00828e8e8686b000

                                                          Static PE Info

                                                          General

                                                          Entrypoint:0x4aae4a
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x606E5812 [Thu Apr 8 01:10:42 2021 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:v4.0.30319
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                          Entrypoint Preview

                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add dword ptr [eax], eax
                                                          add byte ptr [eax], al
                                                          add al, byte ptr [eax]
                                                          add byte ptr [eax], al
                                                          or byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          or eax, 0C000000h
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          pop es
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [edx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], cl
                                                          add byte ptr [eax], al
                                                          push cs
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [ecx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [ebx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          pop es
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add al, byte ptr [eax]
                                                          add byte ptr [eax], al
                                                          push es
                                                          add byte ptr [eax], al
                                                          add byte ptr [edx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          or al, byte ptr [eax]
                                                          add byte ptr [eax], al
                                                          push cs
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [ecx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], cl
                                                          add byte ptr [eax], al
                                                          add eax, 00000000h
                                                          add byte ptr [eax], al
                                                          add byte ptr [ebx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          or eax, dword ptr [eax]
                                                          add byte ptr [eax], al
                                                          or eax, dword ptr [eax]
                                                          add byte ptr [eax], al
                                                          or al, 00h
                                                          add byte ptr [eax], al
                                                          or eax, 02000000h
                                                          add byte ptr [eax], al
                                                          add byte ptr [ecx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [edx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [00000000h], al

                                                          Data Directories

                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xaadf80x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x5c4.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                          Sections

                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000xa93800xa9400False0.791056014586data7.64783610174IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xac0000x5c40x600False0.426432291667data4.12243774291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xae0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                          Resources

                                                          NameRVASizeTypeLanguageCountry
                                                          RT_VERSION0xac0900x334data
                                                          RT_MANIFEST0xac3d40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                          Imports

                                                          DLLImport
                                                          mscoree.dll_CorExeMain

                                                          Version Infos

                                                          DescriptionData
                                                          Translation0x0000 0x04b0
                                                          LegalCopyrightCopyright 2015
                                                          Assembly Version1.0.0.0
                                                          InternalNameEmptySafeHandle.exe
                                                          FileVersion1.0.0.0
                                                          CompanyName
                                                          LegalTrademarks
                                                          Comments
                                                          ProductNameCodewords
                                                          ProductVersion1.0.0.0
                                                          FileDescriptionCodewords
                                                          OriginalFilenameEmptySafeHandle.exe

                                                          Network Behavior

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 8, 2021 13:46:13.711210012 CEST4972120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:13.732436895 CEST2022149721185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:14.244302988 CEST4972120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:14.265645981 CEST2022149721185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:14.775687933 CEST4972120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:14.796777964 CEST2022149721185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:18.839787960 CEST4972320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:18.860980988 CEST2022149723185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:19.369744062 CEST4972320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:19.393098116 CEST2022149723185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:19.901235104 CEST4972320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:19.925354958 CEST2022149723185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:23.934911013 CEST4972420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:23.956831932 CEST2022149724185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:24.588944912 CEST4972420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:24.610357046 CEST2022149724185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:25.276475906 CEST4972420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:25.297641993 CEST2022149724185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:29.413175106 CEST4972920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:29.435884953 CEST2022149729185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:29.980011940 CEST4972920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:30.080003977 CEST2022149729185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:30.776992083 CEST4972920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:30.798041105 CEST2022149729185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:34.825680971 CEST4973120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:34.846745014 CEST2022149731185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:35.464900970 CEST4973120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:35.486252069 CEST2022149731185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:36.074258089 CEST4973120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:36.095602036 CEST2022149731185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:40.133157969 CEST4973320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:40.154408932 CEST2022149733185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:40.777792931 CEST4973320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:40.799101114 CEST2022149733185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:41.465327978 CEST4973320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:41.486330032 CEST2022149733185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:45.500261068 CEST4973420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:45.521605015 CEST2022149734185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:46.075084925 CEST4973420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:46.219413042 CEST2022149734185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:46.778307915 CEST4973420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:46.882353067 CEST2022149734185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:50.889970064 CEST4973620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:50.911468029 CEST2022149736185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:51.419327021 CEST4973620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:51.440475941 CEST2022149736185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:51.950762987 CEST4973620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:51.972137928 CEST2022149736185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:55.984117031 CEST4973720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:56.005712032 CEST2022149737185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:56.513513088 CEST4973720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:56.534604073 CEST2022149737185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:57.044846058 CEST4973720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:57.066253901 CEST2022149737185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:01.124372959 CEST4974120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:01.145566940 CEST2022149741185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:01.654562950 CEST4974120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:01.675853968 CEST2022149741185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:02.185838938 CEST4974120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:02.207357883 CEST2022149741185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:06.250999928 CEST4974720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:06.272123098 CEST2022149747185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:06.780174017 CEST4974720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:06.801246881 CEST2022149747185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:07.311245918 CEST4974720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:07.332509041 CEST2022149747185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:11.368978977 CEST4974820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:11.390117884 CEST2022149748185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:11.905468941 CEST4974820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:11.926462889 CEST2022149748185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:12.436852932 CEST4974820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:12.458122969 CEST2022149748185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:16.519804001 CEST4974920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:16.541778088 CEST2022149749185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:17.046471119 CEST4974920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:17.067728996 CEST2022149749185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:17.577699900 CEST4974920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:17.599661112 CEST2022149749185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:21.610826969 CEST4975020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:21.632276058 CEST2022149750185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:22.140849113 CEST4975020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:22.162409067 CEST2022149750185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:22.672000885 CEST4975020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:22.692967892 CEST2022149750185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:26.704749107 CEST4975120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:26.726562977 CEST2022149751185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:27.234762907 CEST4975120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:27.255563021 CEST2022149751185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:27.766069889 CEST4975120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:27.787094116 CEST2022149751185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:31.849783897 CEST4975220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:31.871042967 CEST2022149752185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:32.376061916 CEST4975220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:32.397571087 CEST2022149752185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:32.907161951 CEST4975220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:32.928354025 CEST2022149752185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:36.964173079 CEST4975420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:36.985239983 CEST2022149754185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:37.501451969 CEST4975420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:37.522430897 CEST2022149754185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:38.032643080 CEST4975420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:38.054006100 CEST2022149754185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:42.084706068 CEST4975620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:42.107184887 CEST2022149756185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:42.611126900 CEST4975620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:42.632389069 CEST2022149756185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:43.142827034 CEST4975620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:43.164071083 CEST2022149756185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:47.174904108 CEST4975720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:47.195996046 CEST2022149757185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:47.705212116 CEST4975720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:47.727128029 CEST2022149757185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:48.236705065 CEST4975720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:48.257775068 CEST2022149757185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:52.270991087 CEST4975820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:52.293072939 CEST2022149758185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:52.799829960 CEST4975820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:52.821208954 CEST2022149758185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:53.330723047 CEST4975820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:53.352060080 CEST2022149758185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:57.365530968 CEST4975920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:57.386419058 CEST2022149759185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:57.893836021 CEST4975920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:57.916927099 CEST2022149759185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:58.424998045 CEST4975920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:58.446228027 CEST2022149759185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:02.480849028 CEST4976020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:02.501987934 CEST2022149760185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:03.003392935 CEST4976020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:03.024307013 CEST2022149760185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:03.534710884 CEST4976020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:03.556003094 CEST2022149760185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:07.582699060 CEST4976120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:07.603934050 CEST2022149761185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:08.113446951 CEST4976120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:08.134336948 CEST2022149761185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:08.644478083 CEST4976120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:08.684834003 CEST2022149761185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:12.713567019 CEST4976220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:12.734925032 CEST2022149762185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:13.238672018 CEST4976220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:13.259932041 CEST2022149762185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:13.770442009 CEST4976220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:13.791731119 CEST2022149762185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:17.802222967 CEST4976320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:17.823380947 CEST2022149763185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:18.332758904 CEST4976320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:18.354016066 CEST2022149763185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:18.864144087 CEST4976320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:18.886801958 CEST2022149763185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:22.896863937 CEST4976420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:22.918287039 CEST2022149764185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:23.426992893 CEST4976420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:23.448729992 CEST2022149764185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:23.959178925 CEST4976420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:23.980318069 CEST2022149764185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:27.990766048 CEST4976520221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:28.013067007 CEST2022149765185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:28.521168947 CEST4976520221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:28.543148041 CEST2022149765185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:29.052542925 CEST4976520221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:29.073720932 CEST2022149765185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:33.106048107 CEST4976620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:33.127466917 CEST2022149766185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:33.630907059 CEST4976620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:33.652029991 CEST2022149766185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:48:34.162306070 CEST4976620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:48:34.183345079 CEST2022149766185.140.53.138192.168.2.3

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 8, 2021 13:45:50.144335985 CEST6493853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:50.156678915 CEST53649388.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:50.897170067 CEST6015253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:50.910936117 CEST53601528.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:52.314327002 CEST5754453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:52.327261925 CEST53575448.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:53.091007948 CEST5598453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:53.103490114 CEST53559848.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:54.141700983 CEST6418553192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:54.154583931 CEST53641858.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:55.250819921 CEST6511053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:55.263695002 CEST53651108.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:56.224210978 CEST5836153192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:56.236684084 CEST53583618.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:57.394275904 CEST6349253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:57.406982899 CEST53634928.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:58.531330109 CEST6083153192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:58.543525934 CEST53608318.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:00.014127016 CEST6010053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:00.026546955 CEST53601008.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:01.958007097 CEST5319553192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:01.972522974 CEST53531958.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:06.442111969 CEST5014153192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:06.455112934 CEST53501418.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:07.383676052 CEST5302353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:07.395720005 CEST53530238.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:08.155656099 CEST4956353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:08.168270111 CEST53495638.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:09.213501930 CEST5135253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:09.226522923 CEST53513528.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:10.251750946 CEST5934953192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:10.264487028 CEST53593498.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:12.506422997 CEST5708453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:12.519306898 CEST53570848.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:15.063283920 CEST5882353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:15.076936960 CEST53588238.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:24.543615103 CEST5756853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:24.555962086 CEST53575688.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:29.385437965 CEST5054053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:29.405744076 CEST53505408.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:31.097193003 CEST5436653192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:31.136003017 CEST53543668.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:34.811719894 CEST5303453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:34.824659109 CEST53530348.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:37.878189087 CEST5776253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:37.897670031 CEST53577628.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:40.119041920 CEST5543553192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:40.131942034 CEST53554358.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:48.656281948 CEST5071353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:48.682682037 CEST53507138.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:00.486263990 CEST5613253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:00.499092102 CEST53561328.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:01.103029013 CEST5898753192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:01.123177052 CEST53589878.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:04.009078979 CEST5657953192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:04.027581930 CEST53565798.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:06.233858109 CEST6063353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:06.249541044 CEST53606338.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:11.354652882 CEST6129253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:11.367309093 CEST53612928.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:31.827198982 CEST6361953192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:31.839972019 CEST53636198.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:35.584381104 CEST6493853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:35.597028971 CEST53649388.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:36.942032099 CEST6194653192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:36.962601900 CEST53619468.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:37.557959080 CEST6491053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:37.584523916 CEST53649108.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:42.070487976 CEST5212353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:42.083476067 CEST53521238.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:02.458168983 CEST5613053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:02.479005098 CEST53561308.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:07.568263054 CEST5633853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:07.581543922 CEST53563388.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:12.692738056 CEST5942053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:12.712941885 CEST53594208.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:33.091295958 CEST5878453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:33.105195999 CEST53587848.8.8.8192.168.2.3

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Apr 8, 2021 13:46:29.385437965 CEST192.168.2.38.8.8.80x75c3Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:34.811719894 CEST192.168.2.38.8.8.80x3bdbStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:40.119041920 CEST192.168.2.38.8.8.80x4ab7Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:01.103029013 CEST192.168.2.38.8.8.80x8c2cStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:06.233858109 CEST192.168.2.38.8.8.80xef0bStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:11.354652882 CEST192.168.2.38.8.8.80xcf57Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:31.827198982 CEST192.168.2.38.8.8.80x416Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:36.942032099 CEST192.168.2.38.8.8.80xa026Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:42.070487976 CEST192.168.2.38.8.8.80x5787Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:02.458168983 CEST192.168.2.38.8.8.80x9563Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:07.568263054 CEST192.168.2.38.8.8.80x77a0Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:12.692738056 CEST192.168.2.38.8.8.80xe19fStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:33.091295958 CEST192.168.2.38.8.8.80x4ee7Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Apr 8, 2021 13:46:29.405744076 CEST8.8.8.8192.168.2.30x75c3No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:34.824659109 CEST8.8.8.8192.168.2.30x3bdbNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:40.131942034 CEST8.8.8.8192.168.2.30x4ab7No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:01.123177052 CEST8.8.8.8192.168.2.30x8c2cNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:06.249541044 CEST8.8.8.8192.168.2.30xef0bNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:11.367309093 CEST8.8.8.8192.168.2.30xcf57No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:31.839972019 CEST8.8.8.8192.168.2.30x416No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:36.962601900 CEST8.8.8.8192.168.2.30xa026No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:42.083476067 CEST8.8.8.8192.168.2.30x5787No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:02.479005098 CEST8.8.8.8192.168.2.30x9563No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:07.581543922 CEST8.8.8.8192.168.2.30x77a0No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:12.712941885 CEST8.8.8.8192.168.2.30xe19fNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:33.105195999 CEST8.8.8.8192.168.2.30x4ee7No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)

                                                          Code Manipulations

                                                          Statistics

                                                          CPU Usage

                                                          Click to jump to process

                                                          Memory Usage

                                                          Click to jump to process

                                                          High Level Behavior Distribution

                                                          Click to dive into process behavior distribution

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:13:45:55
                                                          Start date:08/04/2021
                                                          Path:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
                                                          Imagebase:0x180000
                                                          File size:695808 bytes
                                                          MD5 hash:5E618064ECE7E7AE38AF0DC9AA5A5559
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:13:46:07
                                                          Start date:08/04/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'
                                                          Imagebase:0x1120000
                                                          File size:185856 bytes
                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:13:46:08
                                                          Start date:08/04/2021
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6b2800000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:13:46:08
                                                          Start date:08/04/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          Imagebase:0xcd0000
                                                          File size:45152 bytes
                                                          MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          Reputation:high

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >

                                                            Executed Functions

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: zeh,$zeh,
                                                            • API String ID: 0-849049934
                                                            • Opcode ID: a3af5ca1542295190f7ccdee3371e1eac900757645fb1ad26da362aa90359aa3
                                                            • Instruction ID: 973e057daf68d28d534192488f3d9bf85cb868f0678b243d277c4edc3ba21415
                                                            • Opcode Fuzzy Hash: a3af5ca1542295190f7ccdee3371e1eac900757645fb1ad26da362aa90359aa3
                                                            • Instruction Fuzzy Hash: FC712774D0221CDFDB44DFA5E5886ADBBB2FB88301F20846AD416B7354EB709A41CF92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 06D768E7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: InformationProcessQuery
                                                            • String ID:
                                                            • API String ID: 1778838933-0
                                                            • Opcode ID: dc07732e3d2cc0ad58f62a87777c7a609927316b978eba97317d619120b395dc
                                                            • Instruction ID: 45baef1de97703c187e1b8de78e18f51122b84d72af13cdb82e973958d80b02a
                                                            • Opcode Fuzzy Hash: dc07732e3d2cc0ad58f62a87777c7a609927316b978eba97317d619120b395dc
                                                            • Instruction Fuzzy Hash: 8D21F0B59012489FCB10CFAAD884ADEBBF4FB48310F10852AE919A7310D374A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 06D768E7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: InformationProcessQuery
                                                            • String ID:
                                                            • API String ID: 1778838933-0
                                                            • Opcode ID: 5c04806e52ddc76000686c05bfabe774824e463d1c87d082809b08a87bd962d7
                                                            • Instruction ID: f5cfcc67e9899896f4cb150638227ee49e0a467384c746713fcb0b81ea592618
                                                            • Opcode Fuzzy Hash: 5c04806e52ddc76000686c05bfabe774824e463d1c87d082809b08a87bd962d7
                                                            • Instruction Fuzzy Hash: F021BAB59006499FCB10DFAAD884ADEFBF4FB48324F10852AE918A7350D775A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <fr
                                                            • API String ID: 0-2340602291
                                                            • Opcode ID: b7e2ffe7b766afc005e8461a31b9a6409acc054bdb573e22f5854c2e16b5d36e
                                                            • Instruction ID: 6c1b6b67c3e800a47891d0456000abdf21bb41728c683229dab298f5098b8b9d
                                                            • Opcode Fuzzy Hash: b7e2ffe7b766afc005e8461a31b9a6409acc054bdb573e22f5854c2e16b5d36e
                                                            • Instruction Fuzzy Hash: 82B1BE70E0522CDFDB54CFA4D844AEDBBB2FB49301F10896AE44AA7251EB349941CF66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <fr
                                                            • API String ID: 0-2340602291
                                                            • Opcode ID: 362b7a3def46d293977e8eada3ac86862271094d081b1b922a5c94fef9740bf9
                                                            • Instruction ID: 76eb904755cb26d727f90478ff63f2c859b8704b79bffca404f1b8ceb1082dc4
                                                            • Opcode Fuzzy Hash: 362b7a3def46d293977e8eada3ac86862271094d081b1b922a5c94fef9740bf9
                                                            • Instruction Fuzzy Hash: 60A16670E0122CCFDB54DFA5D884AEDBBB1FF89300F10996AD44AAB255EB349941CF15
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: zeh,
                                                            • API String ID: 0-4096138083
                                                            • Opcode ID: 4d2b806292d5f5c88dbe4e3c33a8985877b013bc9bb8fa4c59c04835cf24e1dc
                                                            • Instruction ID: d333c5f1b268828d57ec4cfa1e9b762d3a3637c4ceb5d33433041c451743be9b
                                                            • Opcode Fuzzy Hash: 4d2b806292d5f5c88dbe4e3c33a8985877b013bc9bb8fa4c59c04835cf24e1dc
                                                            • Instruction Fuzzy Hash: 90712874D01218DFDB44DFA5E4886ADBBB2FF88301F20846AD41AA7355EB349A41CF52
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: T:h
                                                            • API String ID: 0-187949993
                                                            • Opcode ID: 1c59cab312373d752a484faa0836c096be9f632b981c2972bac9660acbf1af79
                                                            • Instruction ID: 9daca6b8415081d1fda098bd536245733fb3671ad1462f93771ea0955d391611
                                                            • Opcode Fuzzy Hash: 1c59cab312373d752a484faa0836c096be9f632b981c2972bac9660acbf1af79
                                                            • Instruction Fuzzy Hash: 9A413775E162188FDB48CFA5D9406DEBBF2FF89201F14952AD406B7354EB349801CA69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2f009625cbd4c4bab19652980398aebdc230cc2ada9d0b89c77250b18cc6659
                                                            • Instruction ID: 83f7547333a78b23d7c444c80364eaad967266646ff65061f36468843b30ce48
                                                            • Opcode Fuzzy Hash: b2f009625cbd4c4bab19652980398aebdc230cc2ada9d0b89c77250b18cc6659
                                                            • Instruction Fuzzy Hash: C0C12734E1620C9FEB44CFA4DA45BDDBBB2EB88300F60906AE405BB395E775A941CB54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 980b0c24c6fd33735ecb87be8da32742167beb33fe2905228f450098e9d11ed7
                                                            • Instruction ID: afd3b73063ec03c21c177598afcce840c25185d82fa6daf40ecec6a27e5e0899
                                                            • Opcode Fuzzy Hash: 980b0c24c6fd33735ecb87be8da32742167beb33fe2905228f450098e9d11ed7
                                                            • Instruction Fuzzy Hash: A5512074E017598FDB54CFA9C9405DDBBB6FF89300F20862AD519AB614EB30A996CB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d27217061010de1d64e195700e1f2ae44411164e096f0a6958e7a959ffd7537
                                                            • Instruction ID: 0ac4ef8d3bd108c9a7585c91e24817940f39b50d60ac365c0cfe827658c3384f
                                                            • Opcode Fuzzy Hash: 6d27217061010de1d64e195700e1f2ae44411164e096f0a6958e7a959ffd7537
                                                            • Instruction Fuzzy Hash: 8D115A30D062188FDB14CFA6C428BEEBAF5AB4E301F189069D405B7391C7784E84CF68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 734466b2f2346ba3cfcdea87444fe87baa6a4002c91688f060a80ee56e0bc800
                                                            • Instruction ID: f9078feabafd621a456c3f4b6d5a5e77bffb7a8d170fe6f69180b10bdbcd9bb9
                                                            • Opcode Fuzzy Hash: 734466b2f2346ba3cfcdea87444fe87baa6a4002c91688f060a80ee56e0bc800
                                                            • Instruction Fuzzy Hash: 78113C70D062188FDB148FA5C4287EEBBF4AB0E301F189069D455B7391C7784E44CF68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2aab9dedbcba616753c325bddc4d446d7a06d7c42fe0ace122600b7aebc3647f
                                                            • Instruction ID: 894da010a3fed5c4a062f1ee56882ee7f0d8393653cfcc2e040fcd2382389f7b
                                                            • Opcode Fuzzy Hash: 2aab9dedbcba616753c325bddc4d446d7a06d7c42fe0ace122600b7aebc3647f
                                                            • Instruction Fuzzy Hash: 45E02B6184E249CFD7104BA088782F97F70EB07242F54508AC081FB352C36C4906C758
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00986BF0
                                                            • GetCurrentThread.KERNEL32 ref: 00986C2D
                                                            • GetCurrentProcess.KERNEL32 ref: 00986C6A
                                                            • GetCurrentThreadId.KERNEL32 ref: 00986CC3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: e3af8ae27f240825e985175ba4aa361071cca9033f25aca702777a7b7bac0949
                                                            • Instruction ID: 30792d11fffd08a3e2e8016e17e7964543a80e477864e8470e260b810effb6d4
                                                            • Opcode Fuzzy Hash: e3af8ae27f240825e985175ba4aa361071cca9033f25aca702777a7b7bac0949
                                                            • Instruction Fuzzy Hash: 6C5156B09003488FDB14EFAAD948B9EBBF0FF48304F208459E159A73A1D774A845CF66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 00986BF0
                                                            • GetCurrentThread.KERNEL32 ref: 00986C2D
                                                            • GetCurrentProcess.KERNEL32 ref: 00986C6A
                                                            • GetCurrentThreadId.KERNEL32 ref: 00986CC3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 445f6f4fee507236d88ab7a1e0089e1ecc90caafda92560f5d8d41a10770675f
                                                            • Instruction ID: be2014a1a582cb4977ddac8ddbcd2ccbbfa71648aadbbd07f3844d79e1f0131e
                                                            • Opcode Fuzzy Hash: 445f6f4fee507236d88ab7a1e0089e1ecc90caafda92560f5d8d41a10770675f
                                                            • Instruction Fuzzy Hash: CC5154B09003498FDB14EFAAD648BAEBBF0FF48314F208559E159A7360D774A845CF65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06D7B2DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 5754fbc68ddadc2787e46eee233502a933dd8057c33b6c7458e3b2d7705c33ea
                                                            • Instruction ID: e5f82a5d2faf15df6b382c2561ee95716f0c7b1d0d35f7c42b468d7c72ec8918
                                                            • Opcode Fuzzy Hash: 5754fbc68ddadc2787e46eee233502a933dd8057c33b6c7458e3b2d7705c33ea
                                                            • Instruction Fuzzy Hash: DC915F71D00219DFDF54DFA8C881BEDBBB2BF48314F14856AE819A7240EB749985CF92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06D7B2DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 8640a182ed3c975c76793693ff257b1c6f2eabb5ce17426fceb58de1e341209c
                                                            • Instruction ID: f2b25bbabd1f65e71e5f86ae1c388597d419ec89786d2655ef8d6f19666a0b20
                                                            • Opcode Fuzzy Hash: 8640a182ed3c975c76793693ff257b1c6f2eabb5ce17426fceb58de1e341209c
                                                            • Instruction Fuzzy Hash: E9914F71D00219DFDB54DFA4C881BDDBBB2FF48314F14856AE819A7240EB749985CF92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0098BE0E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 902f99440e885be25a9f956a036ffb8d4eefc4425326455c8c61b71c4d72de5e
                                                            • Instruction ID: 84926b7c2e7211a0562b219156429d580bb7b8365f46087edbfc383c7f10970f
                                                            • Opcode Fuzzy Hash: 902f99440e885be25a9f956a036ffb8d4eefc4425326455c8c61b71c4d72de5e
                                                            • Instruction Fuzzy Hash: 68713470A00B058FD724EF2AD05575ABBF5FF88304F048A29E59AD7B50DB75E80A8B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0098DD8A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: f7e397379cdaff8fb2db874d10fe2ce19f631e7a383c16eeccb61583f9cc321f
                                                            • Instruction ID: b989a27ac93d04cee21924f126a56fd994211b11e94424fb9f3cbf303c5d5057
                                                            • Opcode Fuzzy Hash: f7e397379cdaff8fb2db874d10fe2ce19f631e7a383c16eeccb61583f9cc321f
                                                            • Instruction Fuzzy Hash: E351BEB1D013089FDB14DFA9D884ADEFBB5BF88314F24862AE819AB350D7749945CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0098DD8A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: cab2d5e281afe79d2bee7507cbe4a3edb4af0cadb2b2a8d9b56d27bdc60705ab
                                                            • Instruction ID: e954a5e9721e62320047db79864c0d3cd6dec8a8e9068bb406c26d0d181104eb
                                                            • Opcode Fuzzy Hash: cab2d5e281afe79d2bee7507cbe4a3edb4af0cadb2b2a8d9b56d27bdc60705ab
                                                            • Instruction Fuzzy Hash: FA41CFB1D013089FDB14DF99C884ADEFBB5BF48314F24862AE819AB350D7749945CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 06D7AD06
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: ContextThread
                                                            • String ID:
                                                            • API String ID: 1591575202-0
                                                            • Opcode ID: aef2bd807a2d983efa0e2b89b918b8784c612afda4157953cf6a0ee501b57b03
                                                            • Instruction ID: ffac2988bf2cafeb99e56d20e3c5bf0bf4f802bc479ff35b9bb9d23cf9c05bbb
                                                            • Opcode Fuzzy Hash: aef2bd807a2d983efa0e2b89b918b8784c612afda4157953cf6a0ee501b57b03
                                                            • Instruction Fuzzy Hash: 46310070916348AFCB00CFA9C840BEFBFF5AF49298F08806AE545E7641D7789504CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00986E3F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 8f1a87cc3453a444bd6bae6823b1f3c5cedca9f12709f71fef23ea96fd99e0e0
                                                            • Instruction ID: 42a8e6f3f9f0c5f4d660b28b3a2cfeb2ddb2f6416bd8c401d51b204331ea717f
                                                            • Opcode Fuzzy Hash: 8f1a87cc3453a444bd6bae6823b1f3c5cedca9f12709f71fef23ea96fd99e0e0
                                                            • Instruction Fuzzy Hash: 8C414976900208AFCB01DF99D844AEEBFF5FB88320F04801AF914A7351C7359955DFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06D7AEB0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 5fc5d9bff25033b7c2a6d0e0d2b5a3bd469a5edc27347407290194084c5d6b0d
                                                            • Instruction ID: 83e6f428d80efcfbf9c0f956ac73fa21f169b22f15fef830b9e6d4545da3443b
                                                            • Opcode Fuzzy Hash: 5fc5d9bff25033b7c2a6d0e0d2b5a3bd469a5edc27347407290194084c5d6b0d
                                                            • Instruction Fuzzy Hash: 5121F6719003499FCB10DFA9C884BDEBBF5FF48354F54842AE919A7340D7789944CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06D7AF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 6dd232748c59f519f688e35b32d9d09295d1dae0c04f8ee102e2d4f1bce1014e
                                                            • Instruction ID: 3eaea90ac75df560f6114ff23b159b253788b522d097bfdf44da016d85d65834
                                                            • Opcode Fuzzy Hash: 6dd232748c59f519f688e35b32d9d09295d1dae0c04f8ee102e2d4f1bce1014e
                                                            • Instruction Fuzzy Hash: 902136B1D002099FCB10DFAAC880BEEFBB5FF48324F54852AE519A3240D7389904CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00986E3F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 5505d007633b98822874dabd118e8da9b62f29bd2294a710efbed7fb5b0061f6
                                                            • Instruction ID: ff7978fa3a6e66aea3e1982a587cb4c45cf9016a690d42df5200c97358c5f73b
                                                            • Opcode Fuzzy Hash: 5505d007633b98822874dabd118e8da9b62f29bd2294a710efbed7fb5b0061f6
                                                            • Instruction Fuzzy Hash: 382103B5900208DFDB10DFA9D984AEEFBF4FB48324F14841AE954A7311D374A955CF60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 06D7AD06
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: ContextThread
                                                            • String ID:
                                                            • API String ID: 1591575202-0
                                                            • Opcode ID: 6102c30203d5ad202f2e4a35f335eb3f9fa9d6ef5f27c4a9a638433f4cd507d4
                                                            • Instruction ID: 8bd7de896bf10b66435f709bc768742225cf080b40e996225ef0e7b1e201324d
                                                            • Opcode Fuzzy Hash: 6102c30203d5ad202f2e4a35f335eb3f9fa9d6ef5f27c4a9a638433f4cd507d4
                                                            • Instruction Fuzzy Hash: 0B213771D002098FCB10DFAAC4847EEBBF4AF88225F54842AE519A7341DB78A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06D7AF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: ffbf598169585a174003c7f93e38c53fa1b190634536c8f7c41d4f35d80b2ea5
                                                            • Instruction ID: 7c3db55503677b7c45fa0ae2f323e637540884b8bed31d9ef7557d75bfa9e54b
                                                            • Opcode Fuzzy Hash: ffbf598169585a174003c7f93e38c53fa1b190634536c8f7c41d4f35d80b2ea5
                                                            • Instruction Fuzzy Hash: 1A21E4B19002499FCB10DFAAC884BEEFBB5FF48324F55842AE519A7240D7789944DBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00986E3F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 630a79402dd634b5ca264443be4923bbc360b2ded966a606208e208d0d28e099
                                                            • Instruction ID: 2529fe692e5fef763a8ecbe08d30ee8e542969c392d9d7495101842488cb63d9
                                                            • Opcode Fuzzy Hash: 630a79402dd634b5ca264443be4923bbc360b2ded966a606208e208d0d28e099
                                                            • Instruction Fuzzy Hash: 5321C4B59002089FDB10DFAAD984ADEFBF8FB48324F14841AE914A7350D774A954CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 06D7544B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: cd97b204a9d8442bcaa89ec0716c8ebc51eb1ce7fe335335f4abdfee3d08c42a
                                                            • Instruction ID: 5e89172d864583b8994955a49d8722c0ac85b4e5a428968aa9dc289ad79e7518
                                                            • Opcode Fuzzy Hash: cd97b204a9d8442bcaa89ec0716c8ebc51eb1ce7fe335335f4abdfee3d08c42a
                                                            • Instruction Fuzzy Hash: 462127759002099FCB10CF9AD484BDEFBF4FB48324F148429E459A3640D7749A45CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • OutputDebugStringW.KERNELBASE(00000000), ref: 06D78AE8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: DebugOutputString
                                                            • String ID:
                                                            • API String ID: 1166629820-0
                                                            • Opcode ID: 883b4f5ef8b04a85a0242b1671dbbacf4b9e47d6e2560556ec49c817fbdb2d98
                                                            • Instruction ID: 88066fee61590fc09b5b76bae5b41ea0a5e976f9641e78f1179ad7f9f6dcfab3
                                                            • Opcode Fuzzy Hash: 883b4f5ef8b04a85a0242b1671dbbacf4b9e47d6e2560556ec49c817fbdb2d98
                                                            • Instruction Fuzzy Hash: 921147B5C006099FCB10CFAAD444BDEFBB4FB48320F14862AE419A3640D774A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 06D7544B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: da369ff275642481b1787e4fd52852f6efab258f8b9ea00b87ded5b691691154
                                                            • Instruction ID: 0b583d9e0cb7824f21d7cb546edfa5832e65533f58b5d58c3309801741603242
                                                            • Opcode Fuzzy Hash: da369ff275642481b1787e4fd52852f6efab258f8b9ea00b87ded5b691691154
                                                            • Instruction Fuzzy Hash: 8421E7B59002099FCB10DF9AD884BDEFBF4FB48324F148429E558A7350D774A945DFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0098BE89,00000800,00000000,00000000), ref: 0098C09A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 31b1235f0803c7035c298ac0265642ee7aec76281855d318f0703914a8eebd3c
                                                            • Instruction ID: f3d76493db4dc3fa82fe0d90f09ca4e984f96530fb9f08dbdb506ebf74250b38
                                                            • Opcode Fuzzy Hash: 31b1235f0803c7035c298ac0265642ee7aec76281855d318f0703914a8eebd3c
                                                            • Instruction Fuzzy Hash: 291136B1800308CFDB20DFAAD444B9EFBF4AB48354F10842AE415B7300C375A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06D7ADCE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 5a98469d30ccec318def3288e01db18e056249dcb7cbbfbb9069d1a0d588fbf2
                                                            • Instruction ID: f5b8e7ed5bb3cd1d41f7729870bb85fa58a81b6148447c77f14243056352a8cd
                                                            • Opcode Fuzzy Hash: 5a98469d30ccec318def3288e01db18e056249dcb7cbbfbb9069d1a0d588fbf2
                                                            • Instruction Fuzzy Hash: DE1137719002489FCF10DFAAC844BDFFBF5AF88324F14881AE515A7250DB79A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 67bbd18e1e5347edb22bd7447e61e157d6f1e43d95ebc6043403475aab9fbb1d
                                                            • Instruction ID: 0abab00f913763e0d19185c0220f4f1b996b69c88cc16f9ac021eb47c62905a6
                                                            • Opcode Fuzzy Hash: 67bbd18e1e5347edb22bd7447e61e157d6f1e43d95ebc6043403475aab9fbb1d
                                                            • Instruction Fuzzy Hash: 28115BB1D042498FCB10DFAAD4447EEFBF5AF88224F14882AE115B7340DB799944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0098BE89,00000800,00000000,00000000), ref: 0098C09A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 3592e057960da6cd7598cb26367fb3f2d8ff7005a242ec3aefb3c7a5422f7bfa
                                                            • Instruction ID: 3a1ac95192a002b2fe637841f2ebfa6dda105d7e99833987e1dd8c66198dfe25
                                                            • Opcode Fuzzy Hash: 3592e057960da6cd7598cb26367fb3f2d8ff7005a242ec3aefb3c7a5422f7bfa
                                                            • Instruction Fuzzy Hash: 841144B6800208CFCB10DFAAC544BDEFBF4AB48354F14852AE415B7700C375A949CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • OutputDebugStringW.KERNELBASE(00000000), ref: 06D78AE8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: DebugOutputString
                                                            • String ID:
                                                            • API String ID: 1166629820-0
                                                            • Opcode ID: 15c0e46a4abb751c3a1ccc3f83a96a2f99550331200f1b715001fa08399c77a5
                                                            • Instruction ID: 89ff07ce754920aac1aeb73bd479c6c804d3387b6a1731e18051afe79c35ecaf
                                                            • Opcode Fuzzy Hash: 15c0e46a4abb751c3a1ccc3f83a96a2f99550331200f1b715001fa08399c77a5
                                                            • Instruction Fuzzy Hash: 4E1134B1C006199FCB10CF9AD844B9EFBB4FB48324F14852AE818B3740D774A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 61fb973b947c1446f331ff770c749b2e5c3ac53cc9a6eb1d038b73a696ef68c1
                                                            • Instruction ID: d0fd33ba98d0c1c2a38b240575186fad762219b24bb4ad03117b3fd7d697936b
                                                            • Opcode Fuzzy Hash: 61fb973b947c1446f331ff770c749b2e5c3ac53cc9a6eb1d038b73a696ef68c1
                                                            • Instruction Fuzzy Hash: 82113A71D043488BCB10DFAAD4447EFFBF5AB88224F14841AD519B7740DB79A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0E8B031D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: a9f8c3bac488ac7e6b0aaa877e6b0ac04a85670e4cb7c18434e0baed9c7fbce0
                                                            • Instruction ID: b5048e1bfb3923da9a32c2526601b8e9f105945246611251bee9c79e727cdac2
                                                            • Opcode Fuzzy Hash: a9f8c3bac488ac7e6b0aaa877e6b0ac04a85670e4cb7c18434e0baed9c7fbce0
                                                            • Instruction Fuzzy Hash: ED11F2B58002499FCB20DF9AD488BDEBFF4EB48324F10855AE555A7710C375A948CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0098BE0E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 51f71b956b19e48fca4134eb2ebde1277a4b4d19852b1f6a69640985cd6e6436
                                                            • Instruction ID: 8de4a9a3150cc40601a38b81619dee8b48b40aacaaef9be2cac7e3e5ca50adaa
                                                            • Opcode Fuzzy Hash: 51f71b956b19e48fca4134eb2ebde1277a4b4d19852b1f6a69640985cd6e6436
                                                            • Instruction Fuzzy Hash: E9110FB6C002498FCB20DF9AC444BDEFBF8EB88324F14852AD919A7710C374A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetWindowLongW.USER32(?,?,?), ref: 0098DF1D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: b8c1a35fd914a90af67263d6cd7c3ae35a1e6465a37e7fd2d43615fd4df8de2f
                                                            • Instruction ID: 0d57da2e937df2ba4cffe620e7d66deebbf2190bd945c7eccf2191acae9c82c3
                                                            • Opcode Fuzzy Hash: b8c1a35fd914a90af67263d6cd7c3ae35a1e6465a37e7fd2d43615fd4df8de2f
                                                            • Instruction Fuzzy Hash: A41103B58002098FDB20DF99D584BDEFBF8EB48324F20851AE959A7740C374A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 0E8B031D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 72b7015829fbfe8f680ade4f31abd340822fef94716d5f41b8be38481a0b9f3b
                                                            • Instruction ID: 6008502b588c31aa222e7150412f74ea6d7ae7e11edb3c559bf1872f29d501dd
                                                            • Opcode Fuzzy Hash: 72b7015829fbfe8f680ade4f31abd340822fef94716d5f41b8be38481a0b9f3b
                                                            • Instruction Fuzzy Hash: 7511CEB58002499FDB20DF9AD888BDEBBF8EB48324F10841AE559A7750C375A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetWindowLongW.USER32(?,?,?), ref: 0098DF1D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: 208e68d1cb8bedcfe68cd30f18175a6d24585fffd2bc26bf6dcdc803d16f5c9b
                                                            • Instruction ID: fc570c3a6ebfd54f2a4bc20b55e1c5f50f60206282b100f7a8ce48662eae5184
                                                            • Opcode Fuzzy Hash: 208e68d1cb8bedcfe68cd30f18175a6d24585fffd2bc26bf6dcdc803d16f5c9b
                                                            • Instruction Fuzzy Hash: D211E2B58003099FDB20DF9AD588BDEFBF8EB48324F10851AE919A7740C774A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.222587203.00000000007FD000.00000040.00000001.sdmp, Offset: 007FD000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3d410d25fdff2296280a63a05c583f6f367cbe851bfc0a32105d940c11ead24
                                                            • Instruction ID: e2c7604c029d7ca2740058e5fccca62e562a514061c9fbc46ef2e8b2898be2fb
                                                            • Opcode Fuzzy Hash: d3d410d25fdff2296280a63a05c583f6f367cbe851bfc0a32105d940c11ead24
                                                            • Instruction Fuzzy Hash: 2B213DB1504248DFCB20DF54D9C0B36BB66FB84318F248569EA054B346C33ADC65C7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223150133.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bec02d617b2d205349e3b5c54f4a0953a652880b31de651d3b4114f32640a10c
                                                            • Instruction ID: 50f442e6ef63624aec026c8bb8af733c4241197af2290e36a6ad61f14356b0ae
                                                            • Opcode Fuzzy Hash: bec02d617b2d205349e3b5c54f4a0953a652880b31de651d3b4114f32640a10c
                                                            • Instruction Fuzzy Hash: 3521F571504784DFCB14DF25D9C0B26BB65FB85318F28C5A9E80A8B746C736D84BCA61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223150133.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 33f5caa41dfe314dcb202bc7ed9ed5191a902e192a78fde736c7843105f30224
                                                            • Instruction ID: 7dfb1ddf0a75c19d7c856c53077a33d71c0037865c1f2aaecff50e4d93af75ac
                                                            • Opcode Fuzzy Hash: 33f5caa41dfe314dcb202bc7ed9ed5191a902e192a78fde736c7843105f30224
                                                            • Instruction Fuzzy Hash: DB2107B5504384DFDB01DF21D9C0B26BB65FB85318F24C5ADEA098B346C736E84ACB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223150133.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e8877ece8b983d3b2e4f388d9cad20c62fe7d182b7e61b504b14e97ae8c4462a
                                                            • Instruction ID: ed0eb86982aaf7f74e962199c8602f3416cc18db1a7645387937de0037bc3cc8
                                                            • Opcode Fuzzy Hash: e8877ece8b983d3b2e4f388d9cad20c62fe7d182b7e61b504b14e97ae8c4462a
                                                            • Instruction Fuzzy Hash: AD2150755087C09FCB12CF24D994B11BF71FB46314F28C5EAD8498B667C33A985ACB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.222587203.00000000007FD000.00000040.00000001.sdmp, Offset: 007FD000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                                            • Instruction ID: 3d8d0147e328dee7b0568ffe8e45da90c4298fbd8cf133cc8580432b1e583967
                                                            • Opcode Fuzzy Hash: 4c44e5517e690f366dff050201c0b94941bd0826892d3e316883c0148e970eb9
                                                            • Instruction Fuzzy Hash: B111D376404284CFCB11CF14D5C4B26BF72FB94324F2486A9D9090B716C33AD86ACBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223150133.00000000008ED000.00000040.00000001.sdmp, Offset: 008ED000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 088bb676d9cc58b7b5583b2d12a323ce7eb7cea81b0eb8fe1e3b9802e29bf41a
                                                            • Instruction ID: 9a7703277f2326256212a39958ea046598acb4c76b6760cfb6fdcc5828dc6ec2
                                                            • Opcode Fuzzy Hash: 088bb676d9cc58b7b5583b2d12a323ce7eb7cea81b0eb8fe1e3b9802e29bf41a
                                                            • Instruction Fuzzy Hash: 6C118B75904280DFCB11CF24D6C4B15FBB1FB85324F28C6A9D9498B656C33AE84ACB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.222587203.00000000007FD000.00000040.00000001.sdmp, Offset: 007FD000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b1d853524bc8282feb01fb51fd63d6f6c22be46a43ab2cfc66df56c409d9e12
                                                            • Instruction ID: 39e896a4bf37b529ee29c641fe5b1a1634261cff370a798cd612ab19b381a21c
                                                            • Opcode Fuzzy Hash: 6b1d853524bc8282feb01fb51fd63d6f6c22be46a43ab2cfc66df56c409d9e12
                                                            • Instruction Fuzzy Hash: 1F0184715083489AD7307A26D884BB6FB99EF41768F18855AEE095F346C37C9C44C671
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.222587203.00000000007FD000.00000040.00000001.sdmp, Offset: 007FD000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efbc688b72a0d2100c6052f99394ce50ed2fd3b386ec52bd0abf598d51462859
                                                            • Instruction ID: e9354cf865492f36dabc48c155f9738cd2d1a747cb009448b90503117c2b8a16
                                                            • Opcode Fuzzy Hash: efbc688b72a0d2100c6052f99394ce50ed2fd3b386ec52bd0abf598d51462859
                                                            • Instruction Fuzzy Hash: B2F06271404348AEE7209A1ADC84BB2FFA8EF51774F18C55AEE085F786C3789C44CAB1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Non-executed Functions

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: iEz3$wC$wC$&"4$&"4
                                                            • API String ID: 0-118644965
                                                            • Opcode ID: b51a68b927f90e9f2d1fb68d77b8d61fc9483afa51d05c0ab27c7457133b620a
                                                            • Instruction ID: 4c969a02e69cabafdd5461bd84772e8f3f2d5c5d030bb145759876fa931a2b86
                                                            • Opcode Fuzzy Hash: b51a68b927f90e9f2d1fb68d77b8d61fc9483afa51d05c0ab27c7457133b620a
                                                            • Instruction Fuzzy Hash: 6971E3B4E0020ADFCB84CF99D9819AEFBB1BF49314F18865AD415AB310E730D982CF95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID: iEz3$wC$wC$&"4
                                                            • API String ID: 0-2156332981
                                                            • Opcode ID: 3b7dc8c9dd0668820facdf5352474a4922cd06e48d1e935a2ac956e6276af1db
                                                            • Instruction ID: 11d9d3610350cad67f092769edb745044315c4f921f519eb236f01f8be53f9b5
                                                            • Opcode Fuzzy Hash: 3b7dc8c9dd0668820facdf5352474a4922cd06e48d1e935a2ac956e6276af1db
                                                            • Instruction Fuzzy Hash: 4261F474E0020ACFCB44CFA9D8819AEFBB2FF89214F18865AD455A7314E734D986CF95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea2422d8a0f52867c35e84467934062ef540d0c470ca399428505d229bcfa7c5
                                                            • Instruction ID: bf893ccf2709838501f3cc36ec6e68b8996072ac3e603760db030dcecdcbae7b
                                                            • Opcode Fuzzy Hash: ea2422d8a0f52867c35e84467934062ef540d0c470ca399428505d229bcfa7c5
                                                            • Instruction Fuzzy Hash: 835259B150A706EFD710CF96E4881993FA1FB4433CF964228D2615FAA0D3BC698ADF54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fafae961b350e379ea5906fbf1f726fcd7b79f6f32df461cc77f7e8ed5075023
                                                            • Instruction ID: 12f9d701e7d3a9d71f7a8dfa1e156b76f43fce0b375d3ae9279106f75475a4f2
                                                            • Opcode Fuzzy Hash: fafae961b350e379ea5906fbf1f726fcd7b79f6f32df461cc77f7e8ed5075023
                                                            • Instruction Fuzzy Hash: 89D1AB707016048FEB29EB7AC460BAEB7E6AF88700F14846DD146DB3A5DB35ED02CB51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81b1f878945ae035c281e5cb01e18aeb52b18dfda51100cc362ee3fb174b3d9c
                                                            • Instruction ID: 2e73511e260790295fe1a82956f97301359209e043af2dbad803b517878484b6
                                                            • Opcode Fuzzy Hash: 81b1f878945ae035c281e5cb01e18aeb52b18dfda51100cc362ee3fb174b3d9c
                                                            • Instruction Fuzzy Hash: B1D19074A006048FDB08DF69C598AE9B7F1BF49705F6584A8E40AEB371DB71AD44CF60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e957d7945fe226f1624f05b270ef88f726acc7c2b981940e299d70a52f7b723d
                                                            • Instruction ID: 4434d4bd46f5d3b6d1d7a4b4d0e25180ff345d3881d4c9af501fb5e31f9f5046
                                                            • Opcode Fuzzy Hash: e957d7945fe226f1624f05b270ef88f726acc7c2b981940e299d70a52f7b723d
                                                            • Instruction Fuzzy Hash: 29B12670E012198FDB44CFE9C5889DEFBF2BF98310F14852AD405AB319E7349942DBA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.223312524.0000000000980000.00000040.00000001.sdmp, Offset: 00980000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 11e180c6f563f6ca727a4f08e8558733cd424f61e655b3642a11caa6d69a3b77
                                                            • Instruction ID: ad286423de4ccccf289eb6f80083904886ab789db12ecc7ccd59144afc07a3c9
                                                            • Opcode Fuzzy Hash: 11e180c6f563f6ca727a4f08e8558733cd424f61e655b3642a11caa6d69a3b77
                                                            • Instruction Fuzzy Hash: 18A15F32E006198FCF05EFA5C8445DEBBB6FF85300B19856AE905BB325EB35AD56CB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cb1e31ae636dc712d79c10c12edbf4eddf886d1ece2c9ae220a121c58661768b
                                                            • Instruction ID: 066fe81e767fc8e3f29e44e816723bb5e605d9cb4dfd0cc6a089bc17915a184a
                                                            • Opcode Fuzzy Hash: cb1e31ae636dc712d79c10c12edbf4eddf886d1ece2c9ae220a121c58661768b
                                                            • Instruction Fuzzy Hash: AB818B75E0520A9FDB44CFE6C451AEEFBF2EB88324F64D426D414BB215E7348A418FA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b315bea410e1ccd978dc7e9818c392199baaa85046339ab00fd6325106b4407
                                                            • Instruction ID: d4792c608378f60985ca0ed5569a8654038f2401c08bbe19e8cc718f1fa0c245
                                                            • Opcode Fuzzy Hash: 1b315bea410e1ccd978dc7e9818c392199baaa85046339ab00fd6325106b4407
                                                            • Instruction Fuzzy Hash: E2913CB4E15219CFDB54CFA5D980AAEFBB2FF89204F14C169D409A7315EB309941CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 65598e8e35c579c4b3ffaa92751a612e029ded89d9f302e3886debdc4a4436be
                                                            • Instruction ID: 461d93634087f9982e44895e5d0c0ccbebfd05eedf2693759461cadf4b7a7533
                                                            • Opcode Fuzzy Hash: 65598e8e35c579c4b3ffaa92751a612e029ded89d9f302e3886debdc4a4436be
                                                            • Instruction Fuzzy Hash: 2D812C74E152198FDB54CFA9D980AAEFBF2FF89204F248169D405A7315EB309941CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 328d2406912901da2bbbc9f6c7fb9b1702bdf89e195a48540f61353b8ab4e0eb
                                                            • Instruction ID: eda70b2521719e35d758b593aedcf46904966ffd4923ab70cd7eaa91145c05d7
                                                            • Opcode Fuzzy Hash: 328d2406912901da2bbbc9f6c7fb9b1702bdf89e195a48540f61353b8ab4e0eb
                                                            • Instruction Fuzzy Hash: DD910874E152198FDB54CFA4D980AAEBBB2FF49304F248199D405AB315DB30AD41DF62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60d94c48b64b73ce9b8836d6433e41e1894eaed4f6f5a5a3fbb36765af0eef95
                                                            • Instruction ID: d90c2f0f1dec3754d0894b4d012dcad5c1dff0a675f628dc788f318a395931e5
                                                            • Opcode Fuzzy Hash: 60d94c48b64b73ce9b8836d6433e41e1894eaed4f6f5a5a3fbb36765af0eef95
                                                            • Instruction Fuzzy Hash: 4F81E1B4E10219CFDB44CF99C58499EFBF2FF88210F248569E515AB364E330AA42CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2c467cd432ebcf6161a8565dc96e2caf599a3b65d9296c9fde64fc7dd3293716
                                                            • Instruction ID: b04b2a6a04855fae69ebf7ca431067ac3fa543fe273af5032d7351fb2d25d951
                                                            • Opcode Fuzzy Hash: 2c467cd432ebcf6161a8565dc96e2caf599a3b65d9296c9fde64fc7dd3293716
                                                            • Instruction Fuzzy Hash: EA810274E11219CFDB44CFA9C58499EBBF2FF88310F248569E509AB365D330AA42CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 125b554223012b7d227f015b81999882888478626a95602b28870587e63fb534
                                                            • Instruction ID: 4001050770dd52474ed51f3ee2b2c84883c9c5c458dfcfe2cf34543eeef78f87
                                                            • Opcode Fuzzy Hash: 125b554223012b7d227f015b81999882888478626a95602b28870587e63fb534
                                                            • Instruction Fuzzy Hash: D2611974E0521ADFDB44CFA5C9919EEBBB2FF89300F18C55AD455A7200E7349A42CF92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e5e574e51789f260912564e5de9f6d37655eec10d5b9d1c7b48c14fba071bc80
                                                            • Instruction ID: 3c9184d11a7417d236d368eb0e7d0924c982527c168b6497f83685cb5f9bc04b
                                                            • Opcode Fuzzy Hash: e5e574e51789f260912564e5de9f6d37655eec10d5b9d1c7b48c14fba071bc80
                                                            • Instruction Fuzzy Hash: 7F61E374E05219CFDB48CFAAC9809DEFBF2FF88211F28952AD455B7314E7309A418B65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c09f0d279e066b5d73b150b76bf3b8f7c5cc1272c258bd031673d03497ab97d3
                                                            • Instruction ID: 0cc7586fe6ab976f093f729e7f42d5108e0f6fb45b432f36851a539718f2d481
                                                            • Opcode Fuzzy Hash: c09f0d279e066b5d73b150b76bf3b8f7c5cc1272c258bd031673d03497ab97d3
                                                            • Instruction Fuzzy Hash: 74610574E052098FDB48CFAAC9809DEFBF2EF88210F28956AD445B7314E3309A418B65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ade8182f7ae686aa37e02b91c29109b22f7b2ea369402a0cb62aace41ef37c5
                                                            • Instruction ID: d95d068397a413d315d9bb850f0270d3a7847a583674fc91e5d58610d106894d
                                                            • Opcode Fuzzy Hash: 0ade8182f7ae686aa37e02b91c29109b22f7b2ea369402a0cb62aace41ef37c5
                                                            • Instruction Fuzzy Hash: BD713974E15219CFDB54CFA5D980AADFBF2FF48204F248169D405A7315EB30A941CFA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac27c9ccc83d38165c0f6ab4d97f1321f85164b22afc74663b95e5d92c0b9006
                                                            • Instruction ID: 662999079612426c7c5915d84553d5e94582ee29e8be92cb26880b5757fc2eec
                                                            • Opcode Fuzzy Hash: ac27c9ccc83d38165c0f6ab4d97f1321f85164b22afc74663b95e5d92c0b9006
                                                            • Instruction Fuzzy Hash: E041FB70E0521A9FDB48CFAAC9415EEFBF2FB88300F14C56AC415A7244E7349A46CF95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 638f037a33bf9dbf3d3c87ece27f9a6616107648f2a7c17ec4c81c940b759598
                                                            • Instruction ID: 54daaa4b9e308ac38a3a5cc99da740562520d6ee60c3125298bcaa09fe7af230
                                                            • Opcode Fuzzy Hash: 638f037a33bf9dbf3d3c87ece27f9a6616107648f2a7c17ec4c81c940b759598
                                                            • Instruction Fuzzy Hash: 9B5149B1E016188BDB68CF6B8D4469EFBF7AFC8300F14C1BA950DA6254EB304A858F51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a04fbe1cccb9f8fdf84fddc79f495366a73b407ed2913c9c15511fc3876f1676
                                                            • Instruction ID: 68c5e29679e467d2eb2b1fefa4a6ceb0058091183ee909b152f4dd82d7cf452a
                                                            • Opcode Fuzzy Hash: a04fbe1cccb9f8fdf84fddc79f495366a73b407ed2913c9c15511fc3876f1676
                                                            • Instruction Fuzzy Hash: 00410671E1560ACFCB44CFA5C9815AEFBF2AB89200F28C66AC414E7254E7309A41CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4d71b47ab4299464ab609c505dea212060bc98d88c2f49b213e1ce83082d61f8
                                                            • Instruction ID: 1c4c7d5e124b25358673a7afd21648aa7980bddf29b1ba13c88fb58b89393879
                                                            • Opcode Fuzzy Hash: 4d71b47ab4299464ab609c505dea212060bc98d88c2f49b213e1ce83082d61f8
                                                            • Instruction Fuzzy Hash: D65127B1E016198BDB68CF6B8D4469EFAF3AFC8301F14C1BA950DA6254EB305A858F51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c0f6fd6ec005ffde38f8c8bfb6b5055bfc22a0ea5cf4a8779d173a56f64ddd7
                                                            • Instruction ID: 0ebfc4bfee664241c069553f37d6d388dba33bb5733070398d6b3015943d387c
                                                            • Opcode Fuzzy Hash: 9c0f6fd6ec005ffde38f8c8bfb6b5055bfc22a0ea5cf4a8779d173a56f64ddd7
                                                            • Instruction Fuzzy Hash: D3410871E1520ACFDB48CFA6C9815AEFBF2FB89300F24C16AC415B7214E7309A41CBA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c3b2d0e1e155f63d0328cc7c611e81aa5157aee996ba8e5ccf3994f4179d470
                                                            • Instruction ID: 62f1e3463312c8a509bbf7a1ba0c97ba9a6ad4613389b198641ad142cf82977e
                                                            • Opcode Fuzzy Hash: 8c3b2d0e1e155f63d0328cc7c611e81aa5157aee996ba8e5ccf3994f4179d470
                                                            • Instruction Fuzzy Hash: 8C41E970D0520A9FDB48CFAAC9815EEFBF2FB88300F14D56AC415A7244E7349A45CF95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 62cb2eda828f097449b393ce687c425d64b2e9e3450fabdcfee1925f66aabce4
                                                            • Instruction ID: e68d61566a23ca7be7bc2323cc3c07b694c3585ef433092bcb7f98f5d7f94f81
                                                            • Opcode Fuzzy Hash: 62cb2eda828f097449b393ce687c425d64b2e9e3450fabdcfee1925f66aabce4
                                                            • Instruction Fuzzy Hash: 62313D70E15619DFEB58CFAAD94069EF7F7EBC8200F14C16AD418A7254EB308A418F51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 65e9e7f54552a7cf40e6f7df93bc9f7b339bcef7ac22886dd8b14d60e19c22e4
                                                            • Instruction ID: f5aacd29c54f5331e84c57ac71f03d3b476ae322bce3f543af37e692865f8fa0
                                                            • Opcode Fuzzy Hash: 65e9e7f54552a7cf40e6f7df93bc9f7b339bcef7ac22886dd8b14d60e19c22e4
                                                            • Instruction Fuzzy Hash: A9314170E156599FEB58CFAAD94069EFBF3AFC9200F14C16ED418E7254EB304A058F52
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c8aaaa0fea7e90dae61e7721cbf19d91dbf6cd47f0a34a9cf6176f3ff27fe475
                                                            • Instruction ID: fe512214dcb41c9f1e7a3cb2560419e1efc890ce45cf7453b725ed177bd3f636
                                                            • Opcode Fuzzy Hash: c8aaaa0fea7e90dae61e7721cbf19d91dbf6cd47f0a34a9cf6176f3ff27fe475
                                                            • Instruction Fuzzy Hash: A511C971E016189BEB58CFABDC406DEFAF7AFC8300F04C07AC908A6218EB3416468E55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e27469d02a01eb7a76c1eb4e727ccd42c24f27c9a94fef49771f3e454a5579b6
                                                            • Instruction ID: 3f77c68c9a5c154eadec048946927aa8c5f6312c5eed20f7a98bcc2497d7c08b
                                                            • Opcode Fuzzy Hash: e27469d02a01eb7a76c1eb4e727ccd42c24f27c9a94fef49771f3e454a5579b6
                                                            • Instruction Fuzzy Hash: 0B118830C052598BCB059FA5C558BEEBBF4BB0A301F04506AD015B7390CB799A84DF64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.230536628.0000000006D70000.00000040.00000001.sdmp, Offset: 06D70000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bca5e2be196a54e59f04d62691c38e24086571745c779f4e6f3e80943a5f38a7
                                                            • Instruction ID: 1b0ce4265a5140ecf3e05ef91ed35b325dcea9c17c7e257bcb2563d94f313908
                                                            • Opcode Fuzzy Hash: bca5e2be196a54e59f04d62691c38e24086571745c779f4e6f3e80943a5f38a7
                                                            • Instruction Fuzzy Hash: E321CE71E056588BEB58CF6BDC4069EFBF3AFC8300F18C5BAD808A6259DB3406458F51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.233341420.000000000E8B0000.00000040.00000001.sdmp, Offset: 0E8B0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 76af0a3b617690fd0c8880e61554382ba0bd1849e089270681d8170d7ed22a8c
                                                            • Instruction ID: 73363807394fce2bb288df6ab2acf20bb7b63a11aeefdcac2028a4c9fa703750
                                                            • Opcode Fuzzy Hash: 76af0a3b617690fd0c8880e61554382ba0bd1849e089270681d8170d7ed22a8c
                                                            • Instruction Fuzzy Hash: 33115730D052588BDB14CFAAC458BEEBAF5AB4E300F14A06AD401B3390C7B89E44DA68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Executed Functions

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.468963891.00000000066E0000.00000040.00000001.sdmp, Offset: 066E0000, based on PE: false
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7260a8a9c26ae388f57efa074b65a223bacd48ca6c067bdc2f8fdef70c6f4e03
                                                            • Instruction ID: 7f60c65d2e43dff8e903f3de5ebe468f67f0563148017266fc83a97bb4c1cd86
                                                            • Opcode Fuzzy Hash: 7260a8a9c26ae388f57efa074b65a223bacd48ca6c067bdc2f8fdef70c6f4e03
                                                            • Instruction Fuzzy Hash: 3E8168B1D05209CFDB50DFA5D8806EEBBB1FF48314F10852AD816B7340DB75994ACB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 5c91f659d6f50635eff35485324edd8c72732dcdd50762f330a06f7416c96588
                                                            • Instruction ID: 229480940e51f1c65f2ce935b1a71a893af3e8c01c5da390816a62d758fca296
                                                            • Opcode Fuzzy Hash: 5c91f659d6f50635eff35485324edd8c72732dcdd50762f330a06f7416c96588
                                                            • Instruction Fuzzy Hash: 377126B0A00B058FD724DF2AD45475ABBF5BF88218F008A2DD58ADBB40DB75E845CBD1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0156FD0A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: c966514713f24d28ac3a3c692c7083935a5331e8649d9518b27b8796a7e8360a
                                                            • Instruction ID: a3451257411c48574f75b58167e76a5b4146575a63be0979c455bbe52531f851
                                                            • Opcode Fuzzy Hash: c966514713f24d28ac3a3c692c7083935a5331e8649d9518b27b8796a7e8360a
                                                            • Instruction Fuzzy Hash: 296178B1C04348AFDB15CFA9D890ACDBFB5FF49314F18816AE814AB252C774A945CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0156FD0A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: f7da3fa3af812bcee417630e0ad9ff72d9523ef9b697d2f622a8185f21fca519
                                                            • Instruction ID: 4423540901d3e861614a84b858b6edb92b7fc930cc574b66186199291f39bcc7
                                                            • Opcode Fuzzy Hash: f7da3fa3af812bcee417630e0ad9ff72d9523ef9b697d2f622a8185f21fca519
                                                            • Instruction Fuzzy Hash: 685112B1C04249AFDF15CFA9D890ADEBFB5FF48314F14816AE918AB221D7719845CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0156FD0A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: 96bcd83bdc6cc0a984c33d23565ea2c7ff43982e020659ad6208cdb5be66cc6a
                                                            • Instruction ID: e9c2460f283acb86edb615357f5e03eb25eedc3f989892f6401716bd30e215e4
                                                            • Opcode Fuzzy Hash: 96bcd83bdc6cc0a984c33d23565ea2c7ff43982e020659ad6208cdb5be66cc6a
                                                            • Instruction Fuzzy Hash: 0251B0B1D04309EFDB14CF9AD894ADEBBB5BF48314F24852AE819AB210D774A845CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0156BCC6,?,?,?,?,?), ref: 0156BD87
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 51686a2ae8d51ba2da01e9afa295b894c27650bf591d1013b357a2438b6c698d
                                                            • Instruction ID: 891600d2d0e7a50440ee8b37a47c708fa7180abf765d182ccfc3dd926d803674
                                                            • Opcode Fuzzy Hash: 51686a2ae8d51ba2da01e9afa295b894c27650bf591d1013b357a2438b6c698d
                                                            • Instruction Fuzzy Hash: EF21D4B5900208AFDB10DFAAD884ADEBBF8FB48324F14841AE915A7310D374A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0156BCC6,?,?,?,?,?), ref: 0156BD87
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: 58271d79b36c9d2cb0270dfb78ffb6ca5204ff208522b636152bb3d1c2ec7d39
                                                            • Instruction ID: c24bc466e681754eea3ee5443fa311679acbef31820b70d4da2de319ad523be2
                                                            • Opcode Fuzzy Hash: 58271d79b36c9d2cb0270dfb78ffb6ca5204ff208522b636152bb3d1c2ec7d39
                                                            • Instruction Fuzzy Hash: 2F21E5B5900248AFDB10DFA9D984AEEFBF8BB48324F14841AE955A7310C3789944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015696A9,00000800,00000000,00000000), ref: 015698BA
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 69fcfb50b974afca52b79ea3ee992a4336cf029ad8f7f6ea77f755406bd41534
                                                            • Instruction ID: 04f77a76e4cf90af792e52a4cd9f12fc05bb04410883af5a969ead717674103d
                                                            • Opcode Fuzzy Hash: 69fcfb50b974afca52b79ea3ee992a4336cf029ad8f7f6ea77f755406bd41534
                                                            • Instruction Fuzzy Hash: 6311D6B5900209DFDB10DF9AD444BDEFBF8FB48314F14842AE515A7600C375A545CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015696A9,00000800,00000000,00000000), ref: 015698BA
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: a1e4f29939110a739503c0ca195b837c5017eec2c6ee137dacbef8ee07eeec7b
                                                            • Instruction ID: 1fee2a32adf8c660cc4fd8ada97f7384d0c8a15916016ebf1cca34dd74d0074a
                                                            • Opcode Fuzzy Hash: a1e4f29939110a739503c0ca195b837c5017eec2c6ee137dacbef8ee07eeec7b
                                                            • Instruction Fuzzy Hash: C81106B68002099FDB10DF9AC844ADEFBF8EB88324F14851AE515A7600C774A545CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,015693FB), ref: 0156962E
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 2e0004f0668959f512bf10e3b631680dac1ee3446553b6ef0486857996e54376
                                                            • Instruction ID: d6cc73007e99d2cbfbbc63492b21dc27ef540342802c303dcf1e72c6c87fce92
                                                            • Opcode Fuzzy Hash: 2e0004f0668959f512bf10e3b631680dac1ee3446553b6ef0486857996e54376
                                                            • Instruction Fuzzy Hash: 621102B5D007098FDB20DF9AD444BDEFBF8EB88228F14891AD919A7700C374A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0156FE28,?,?,?,?), ref: 0156FE9D
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: c229035641e954ff10e60718a42f1f0e2a63816b52767f00455d8c3d55dc4d25
                                                            • Instruction ID: 3f2ecd39416ebfba200b9df9e4d3ee320de849a1a15060ebf50bd0b186036df2
                                                            • Opcode Fuzzy Hash: c229035641e954ff10e60718a42f1f0e2a63816b52767f00455d8c3d55dc4d25
                                                            • Instruction Fuzzy Hash: 5E1103B58002499FDB20DF9AD985BDFBBF8FB48724F10885AE915A7341C374A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0156FE28,?,?,?,?), ref: 0156FE9D
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.462382724.0000000001560000.00000040.00000001.sdmp, Offset: 01560000, based on PE: false
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: bf36ef2d0c91a4e69dde82ac0471c433408f2cf417746b028d5155442304d3be
                                                            • Instruction ID: 2d6408cac20120e03755ef0e5cb2642f51db7a5fd17958c1ce52be8d8a68ed3d
                                                            • Opcode Fuzzy Hash: bf36ef2d0c91a4e69dde82ac0471c433408f2cf417746b028d5155442304d3be
                                                            • Instruction Fuzzy Hash: 2B11F2B58002099FDB10DF9AD989BDEBBF8FB48724F10891AE915A7301C374A944CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Non-executed Functions