Loading ...

Play interactive tourEdit tour

Analysis Report NEW_ORDER.pdf.exe

Overview

General Information

Sample Name:NEW_ORDER.pdf.exe
Analysis ID:383990
MD5:5e618064ece7e7ae38af0dc9aa5a5559
SHA1:9114a9bad82d1430dddadc38e05759782ae166bc
SHA256:f0e948526717e90fe4de5a54a4c2e7b1d80e9e7074ba989292c69e9f67a52a1e
Tags:NanoCore
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • NEW_ORDER.pdf.exe (PID: 5416 cmdline: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' MD5: 5E618064ECE7E7AE38AF0DC9AA5A5559)
    • schtasks.exe (PID: 5492 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5076 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xa8d5d:$x1: NanoCore.ClientPluginHost
  • 0xdbd9d:$x1: NanoCore.ClientPluginHost
  • 0xa8d9a:$x2: IClientNetworkHost
  • 0xdbdda:$x2: IClientNetworkHost
  • 0xac8cd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0xdf90d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xa8ac5:$a: NanoCore
    • 0xa8ad5:$a: NanoCore
    • 0xa8d09:$a: NanoCore
    • 0xa8d1d:$a: NanoCore
    • 0xa8d5d:$a: NanoCore
    • 0xdbb05:$a: NanoCore
    • 0xdbb15:$a: NanoCore
    • 0xdbd49:$a: NanoCore
    • 0xdbd5d:$a: NanoCore
    • 0xdbd9d:$a: NanoCore
    • 0xa8b24:$b: ClientPlugin
    • 0xa8d26:$b: ClientPlugin
    • 0xa8d66:$b: ClientPlugin
    • 0xdbb64:$b: ClientPlugin
    • 0xdbd66:$b: ClientPlugin
    • 0xdbda6:$b: ClientPlugin
    • 0xa8c4b:$c: ProjectData
    • 0xdbc8b:$c: ProjectData
    • 0x199991:$c: ProjectData
    • 0x2179b1:$c: ProjectData
    • 0xa9652:$d: DESCrypto
    00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 16 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    4.2.RegSvcs.exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      4.2.RegSvcs.exe.400000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      4.2.RegSvcs.exe.6230000.9.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      Click to see the 31 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5076, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe' , ParentImage: C:\Users\user\Desktop\NEW_ORDER.pdf.exe, ParentProcessId: 5416, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp', ProcessId: 5492

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: NEW_ORDER.pdf.exeAvira: detected
      Antivirus detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeAvira: detection malicious, Label: HEUR/AGEN.1138557
      Found malware configurationShow sources
      Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeReversingLabs: Detection: 31%
      Multi AV Scanner detection for submitted fileShow sources
      Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 31%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: NEW_ORDER.pdf.exeJoe Sandbox ML: detected
      Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 4.2.RegSvcs.exe.6230000.9.unpackAvira: Label: TR/NanoCore.fadte
      Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: wealth2021.ddns.net
      Source: Malware configuration extractorURLs: 185.140.53.138
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: wealth2021.ddns.net
      Source: global trafficTCP traffic: 192.168.2.3:49721 -> 185.140.53.138:20221
      Source: Joe Sandbox ViewIP Address: 185.140.53.138 185.140.53.138
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: unknownDNS traffic detected: queries for: wealth2021.ddns.net
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmp, NEW_ORDER.pdf.exe, 00000000.00000002.223565195.0000000002521000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4
      Source: NEW_ORDER.pdf.exeString found in binary or memory: http://tempuri.org/GridOneHSDataSet.xsd
      Source: NEW_ORDER.pdf.exeString found in binary or memory: http://tempuri.org/HighScoresDataSet.xsd
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223374262.0000000000BA7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comm
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196181845.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196107574.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc9
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnIT
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnnte
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196438326.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com%
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.196969332.000000000559B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com2
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
      Source: RegSvcs.exe, 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.302a91c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 4.2.RegSvcs.exe.5830000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
      Source: initial sampleStatic PE information: Filename: NEW_ORDER.pdf.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D76868 NtQueryInformationProcess,
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D76860 NtQueryInformationProcess,
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0098C2B0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_00989990
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D77AD8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D7C6E8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D76633
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D754E0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D7CDB0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71ED9
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71EE8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D75E88
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D716A8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71A50
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D77A7C
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D75E79
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71A60
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D707D0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D707C0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71398
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71388
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D757B0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D757A0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D754D0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D720C8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D758F0
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71C80
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D72C80
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D720BB
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D75852
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D71C70
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D72C79
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D791F8
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D78D0B
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B1E60
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B3188
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0156E471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0156E480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_0156BBD4
      Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilename vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.233199984.000000000E480000.00000002.00000001.sdmpBinary or memory string: originalfilename vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.233199984.000000000E480000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000003.221543576.000000000DB0D000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEmptySafeHandle.exe4 vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223565195.0000000002521000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.233062357.000000000E390000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exeBinary or memory string: OriginalFilenameEmptySafeHandle.exe4 vs NEW_ORDER.pdf.exe
      Source: NEW_ORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 4.2.RegSvcs.exe.302a91c.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.5830000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.5830000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: rrnBESjNXy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@13/1
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\cbbvUnffDoOkFzvkbCRnCsWpZ
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3148:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ae697278-0563-480d-a326-4f0ab2164ba0}
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp3114.tmpJump to behavior
      Source: NEW_ORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
      Source: NEW_ORDER.pdf.exeReversingLabs: Detection: 31%
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile read: C:\Users\user\Desktop\NEW_ORDER.pdf.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\NEW_ORDER.pdf.exe 'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: NEW_ORDER.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: NEW_ORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_06D72540 push C035BA79h; ret
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B14B8 push ebp; retf
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeCode function: 0_2_0E8B1510 push ebp; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.64783610174
      Source: initial sampleStatic PE information: section name: .text entropy: 7.64783610174
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\rrnBESjNXy.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Uses an obfuscated file name to hide its real file extension (double extension)Show sources
      Source: Possible double extension: pdf.exeStatic PE information: NEW_ORDER.pdf.exe
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4029
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5596
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 939
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 6132Thread sleep time: -100842s >= -30000s
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exe TID: 5556Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 100842
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMWARE
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: RegSvcs.exe, 00000004.00000003.272286849.00000000013C2000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllaV7]
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
      Source: RegSvcs.exe, 00000004.00000002.469089313.0000000006AB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: FC3008
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      Source: RegSvcs.exe, 00000004.00000002.463173733.00000000030DF000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: RegSvcs.exe, 00000004.00000002.462901107.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: RegSvcs.exe, 00000004.00000002.462901107.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: RegSvcs.exe, 00000004.00000002.464864352.00000000032B5000.00000004.00000001.sdmpBinary or memory string: Program ManagerU
      Source: RegSvcs.exe, 00000004.00000002.462901107.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: RegSvcs.exe, 00000004.00000002.463032101.0000000003023000.00000004.00000001.sdmpBinary or memory string: Program Managert
      Source: RegSvcs.exe, 00000004.00000002.463173733.00000000030DF000.00000004.00000001.sdmpBinary or memory string: Program Manager@ %
      Source: RegSvcs.exe, 00000004.00000002.463173733.00000000030DF000.00000004.00000001.sdmpBinary or memory string: Program Manager\
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Users\user\Desktop\NEW_ORDER.pdf.exe VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\NEW_ORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: NEW_ORDER.pdf.exe, 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegSvcs.exe, 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: NEW_ORDER.pdf.exe PID: 5416, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORY
      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6234629.8.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401ff7c.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.401b146.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.40245a5.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.NEW_ORDER.pdf.exe.3684bd0.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 4.2.RegSvcs.exe.6230000.9.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Masquerading11Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information13Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      NEW_ORDER.pdf.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      NEW_ORDER.pdf.exe100%AviraHEUR/AGEN.1138557
      NEW_ORDER.pdf.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\rrnBESjNXy.exe100%AviraHEUR/AGEN.1138557
      C:\Users\user\AppData\Roaming\rrnBESjNXy.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\rrnBESjNXy.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      0.2.NEW_ORDER.pdf.exe.180000.0.unpack100%AviraHEUR/AGEN.1138557Download File
      0.0.NEW_ORDER.pdf.exe.180000.0.unpack100%AviraHEUR/AGEN.1138557Download File
      4.2.RegSvcs.exe.6230000.9.unpack100%AviraTR/NanoCore.fadteDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://tempuri.org/HighScoresDataSet.xsd0%Avira URL Cloudsafe
      http://www.founder.com.cn/cnIT0%Avira URL Cloudsafe
      http://www.fonts.comc0%URL Reputationsafe
      http://www.fonts.comc0%URL Reputationsafe
      http://www.fonts.comc0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.fonts.comc90%Avira URL Cloudsafe
      http://www.tiro.com20%Avira URL Cloudsafe
      http://www.founder.com.cn/cnnte0%Avira URL Cloudsafe
      http://tempuri.org/GridOneHSDataSet.xsd0%Avira URL Cloudsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      wealth2021.ddns.net0%Avira URL Cloudsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      185.140.53.1380%Avira URL Cloudsafe
      http://www.tiro.com%0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      wealth2021.ddns.net
      185.140.53.138
      truetrue
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        wealth2021.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        185.140.53.138true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://tempuri.org/HighScoresDataSet.xsdNEW_ORDER.pdf.exefalse
        • Avira URL Cloud: safe
        unknown
        http://www.apache.org/licenses/LICENSE-2.0NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
          high
          http://www.fontbureau.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersGNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
              high
              http://www.founder.com.cn/cnITNEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers/?NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                high
                http://www.fonts.comcNEW_ORDER.pdf.exe, 00000000.00000003.196181845.000000000559B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/bTheNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fonts.comc9NEW_ORDER.pdf.exe, 00000000.00000003.196107574.000000000559B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.com2NEW_ORDER.pdf.exe, 00000000.00000003.196969332.000000000559B000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers?NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cnnteNEW_ORDER.pdf.exe, 00000000.00000003.197658552.000000000558E000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/GridOneHSDataSet.xsdNEW_ORDER.pdf.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4NEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssNEW_ORDER.pdf.exe, 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmpfalse
                        high
                        http://www.carterandcone.comlNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.commNEW_ORDER.pdf.exe, 00000000.00000002.223374262.0000000000BA7000.00000004.00000040.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8NEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                              high
                              http://www.fonts.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNEW_ORDER.pdf.exe, 00000000.00000002.223799082.00000000025C2000.00000004.00000001.sdmp, NEW_ORDER.pdf.exe, 00000000.00000002.223565195.0000000002521000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sakkal.comNEW_ORDER.pdf.exe, 00000000.00000002.229401070.0000000005670000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.tiro.com%NEW_ORDER.pdf.exe, 00000000.00000003.196438326.000000000559B000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.140.53.138
                                  wealth2021.ddns.netSweden
                                  209623DAVID_CRAIGGGtrue

                                  General Information

                                  Joe Sandbox Version:31.0.0 Emerald
                                  Analysis ID:383990
                                  Start date:08.04.2021
                                  Start time:13:45:13
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 7m 35s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:NEW_ORDER.pdf.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:28
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.evad.winEXE@6/5@13/1
                                  EGA Information:Failed
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 93%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .exe
                                  Warnings:
                                  Show All
                                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                  • TCP Packets have been reduced to 100
                                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                  • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.255.188.83, 104.43.139.144, 104.42.151.234, 13.64.90.137, 52.147.198.201, 20.82.210.154, 95.100.54.203, 23.10.249.43, 23.10.249.26, 20.54.26.129, 20.82.209.183
                                  • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/383990/sample/NEW_ORDER.pdf.exe

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  13:46:00API Interceptor1x Sleep call for process: NEW_ORDER.pdf.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  185.140.53.138NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                    Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                      URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                        Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                          1PH37n4Gva.exeGet hashmaliciousBrowse
                                            35dbds3GQG.exeGet hashmaliciousBrowse
                                              QXJGE2LOdP.exeGet hashmaliciousBrowse
                                                O4m3hDFNbh.exeGet hashmaliciousBrowse
                                                  nrv_remittance#U007eorder#U007epayment.exeGet hashmaliciousBrowse
                                                    NEW ORDER REQUEST_EXPORT005JKL DOC.exeGet hashmaliciousBrowse
                                                      WIRE COPY ORDER T104484_PP.exeGet hashmaliciousBrowse
                                                        71AXBkD1wA.exeGet hashmaliciousBrowse

                                                          Domains

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          wealth2021.ddns.netNEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138

                                                          ASN

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          DAVID_CRAIGGGsamples ordered 024791.exeGet hashmaliciousBrowse
                                                          • 185.140.53.69
                                                          PO.20210704_quick shipment.exeGet hashmaliciousBrowse
                                                          • 185.140.53.69
                                                          ANS_309487487_#049844874.exeGet hashmaliciousBrowse
                                                          • 185.140.53.9
                                                          tmp2.exeGet hashmaliciousBrowse
                                                          • 185.140.53.71
                                                          tmp.exeGet hashmaliciousBrowse
                                                          • 185.140.53.71
                                                          NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          Doc_58YJ54-521DERG701-55YH701.exeGet hashmaliciousBrowse
                                                          • 185.140.53.230
                                                          Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          FRQ_05694 revised quantity.exeGet hashmaliciousBrowse
                                                          • 185.140.53.69
                                                          INVOICE 15112021.xlsxGet hashmaliciousBrowse
                                                          • 185.140.53.130
                                                          URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          IMG-001982-AW00173-SSE73I.exeGet hashmaliciousBrowse
                                                          • 185.140.53.230
                                                          FYI-Orderimg.exeGet hashmaliciousBrowse
                                                          • 185.140.53.67
                                                          Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.138
                                                          PO-94765809570-Order pdf.exeGet hashmaliciousBrowse
                                                          • 185.140.53.7
                                                          Commercial E-invoice.exeGet hashmaliciousBrowse
                                                          • 185.140.53.137
                                                          Order23032021.xlsGet hashmaliciousBrowse
                                                          • 185.140.53.130
                                                          ZcQwvgqtuQ.exeGet hashmaliciousBrowse
                                                          • 91.193.75.245
                                                          lKIPqaYkKB.exeGet hashmaliciousBrowse
                                                          • 185.140.53.161
                                                          t5R60D503x.exeGet hashmaliciousBrowse
                                                          • 185.140.53.9

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          No context

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW_ORDER.pdf.exe.log
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):1314
                                                          Entropy (8bit):5.350128552078965
                                                          Encrypted:false
                                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                          C:\Users\user\AppData\Local\Temp\tmp3114.tmp
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1643
                                                          Entropy (8bit):5.19287247519914
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGtn:cbh47TlNQ//rydbz9I3YODOLNdq3m
                                                          MD5:FD0EA8856B93E3C828C355804744440B
                                                          SHA1:E5D6AF389AF533573C6EC5624689B47B770B07BA
                                                          SHA-256:92C34996FB6228C10EE9CAF86A7E587A86EA7BE16E950B16FEE28A908DC97D92
                                                          SHA-512:B6951FA8D9B35D1565779880B73B36554AB5038871D38FDEB3B5E5A282A23B1F7FA223D0B155F429D4F0147BC471AD736A3C7CE9BDE4C007F4FD2329BEDDC861
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                          C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          File Type:Non-ISO extended-ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):3.0
                                                          Encrypted:false
                                                          SSDEEP:3:RP:J
                                                          MD5:340C851A07E7700F5198DD6F64611971
                                                          SHA1:D1A54C13DC89534A62F192EC86B6732F0A390348
                                                          SHA-256:2E97838358183765F2BEBE5B6A1DEC4671CD93FFFCA77E0A000B769F7C3EF1FC
                                                          SHA-512:6C8DEAA86143F46FAA4E49B5E6BB8C157F76AB9F3CA6ADAFB6CEFA579882142F879811F2197014C9A3F591DC440AACDD236E6EA522067B6871F0A55F52C9726E
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview: p..W...H
                                                          C:\Users\user\AppData\Roaming\rrnBESjNXy.exe
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):695808
                                                          Entropy (8bit):7.638906088572277
                                                          Encrypted:false
                                                          SSDEEP:12288:4+2SinV2hLEPkhB8AB6pTQwa0WCsLy81giSkKBNLvCfMnjjvUPb:4+2Si8hWkHuFQwJaUVJ3UPb
                                                          MD5:5E618064ECE7E7AE38AF0DC9AA5A5559
                                                          SHA1:9114A9BAD82D1430DDDADC38E05759782AE166BC
                                                          SHA-256:F0E948526717E90FE4DE5A54A4C2E7B1D80E9E7074BA989292C69E9F67A52A1E
                                                          SHA-512:309D7A67808449578426DED36AA1C972F6DBE9A26EEC0969ECB75F98351C40A0DC113D1A2505F931004EAA8E92FC32F5BEE0CA114685EA0BF1411AC0A0D54075
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 31%
                                                          Reputation:low
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Xn`..............P.............J.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................,.......H.......|...Do..............8............................................0............(,...(-.........(.....o.....*.....................(/......(0......(1......(2......(3....*N..(....oK...(4....*&..(5....*.s6........s7........s8........s9........s:........*....0...........~....o;....+..*.0...........~....o<....+..*.0...........~....o=....+..*.0...........~....o>....+..*.0...........~....o?....+..*&..(@....*...0..<........~.....(A.....,!r...p.....(B...oC...sD............~.....
                                                          C:\Users\user\AppData\Roaming\rrnBESjNXy.exe:Zone.Identifier
                                                          Process:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Reputation:high, very likely benign file
                                                          Preview: [ZoneTransfer]....ZoneId=0

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.638906088572277
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Windows Screen Saver (13104/52) 0.07%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          File name:NEW_ORDER.pdf.exe
                                                          File size:695808
                                                          MD5:5e618064ece7e7ae38af0dc9aa5a5559
                                                          SHA1:9114a9bad82d1430dddadc38e05759782ae166bc
                                                          SHA256:f0e948526717e90fe4de5a54a4c2e7b1d80e9e7074ba989292c69e9f67a52a1e
                                                          SHA512:309d7a67808449578426ded36aa1c972f6dbe9a26eec0969ecb75f98351c40a0dc113d1a2505f931004eaa8e92fc32f5bee0ca114685ea0bf1411ac0a0d54075
                                                          SSDEEP:12288:4+2SinV2hLEPkhB8AB6pTQwa0WCsLy81giSkKBNLvCfMnjjvUPb:4+2Si8hWkHuFQwJaUVJ3UPb
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Xn`..............P.............J.... ........@.. ....................................@................................

                                                          File Icon

                                                          Icon Hash:00828e8e8686b000

                                                          Static PE Info

                                                          General

                                                          Entrypoint:0x4aae4a
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x606E5812 [Thu Apr 8 01:10:42 2021 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:v4.0.30319
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                          Entrypoint Preview

                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add dword ptr [eax], eax
                                                          add byte ptr [eax], al
                                                          add al, byte ptr [eax]
                                                          add byte ptr [eax], al
                                                          or byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          or eax, 0C000000h
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          pop es
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [edx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], cl
                                                          add byte ptr [eax], al
                                                          push cs
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [ecx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [ebx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          pop es
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add al, byte ptr [eax]
                                                          add byte ptr [eax], al
                                                          push es
                                                          add byte ptr [eax], al
                                                          add byte ptr [edx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          or al, byte ptr [eax]
                                                          add byte ptr [eax], al
                                                          push cs
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [ecx], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], cl
                                                          add byte ptr [eax], al
                                                          add eax, 00000000h
                                                          add byte ptr [eax], al
                                                          add byte ptr [ebx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax+eax], al
                                                          add byte ptr [eax], al
                                                          or eax, dword ptr [eax]
                                                          add byte ptr [eax], al
                                                          or eax, dword ptr [eax]
                                                          add byte ptr [eax], al
                                                          or al, 00h
                                                          add byte ptr [eax], al
                                                          or eax, 02000000h
                                                          add byte ptr [eax], al
                                                          add byte ptr [ecx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [edx], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [esi], cl
                                                          add byte ptr [eax], al
                                                          add byte ptr [00000000h], al

                                                          Data Directories

                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xaadf80x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x5c4.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                          Sections

                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000xa93800xa9400False0.791056014586data7.64783610174IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rsrc0xac0000x5c40x600False0.426432291667data4.12243774291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0xae0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                          Resources

                                                          NameRVASizeTypeLanguageCountry
                                                          RT_VERSION0xac0900x334data
                                                          RT_MANIFEST0xac3d40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                          Imports

                                                          DLLImport
                                                          mscoree.dll_CorExeMain

                                                          Version Infos

                                                          DescriptionData
                                                          Translation0x0000 0x04b0
                                                          LegalCopyrightCopyright 2015
                                                          Assembly Version1.0.0.0
                                                          InternalNameEmptySafeHandle.exe
                                                          FileVersion1.0.0.0
                                                          CompanyName
                                                          LegalTrademarks
                                                          Comments
                                                          ProductNameCodewords
                                                          ProductVersion1.0.0.0
                                                          FileDescriptionCodewords
                                                          OriginalFilenameEmptySafeHandle.exe

                                                          Network Behavior

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 8, 2021 13:46:13.711210012 CEST4972120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:13.732436895 CEST2022149721185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:14.244302988 CEST4972120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:14.265645981 CEST2022149721185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:14.775687933 CEST4972120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:14.796777964 CEST2022149721185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:18.839787960 CEST4972320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:18.860980988 CEST2022149723185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:19.369744062 CEST4972320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:19.393098116 CEST2022149723185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:19.901235104 CEST4972320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:19.925354958 CEST2022149723185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:23.934911013 CEST4972420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:23.956831932 CEST2022149724185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:24.588944912 CEST4972420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:24.610357046 CEST2022149724185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:25.276475906 CEST4972420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:25.297641993 CEST2022149724185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:29.413175106 CEST4972920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:29.435884953 CEST2022149729185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:29.980011940 CEST4972920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:30.080003977 CEST2022149729185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:30.776992083 CEST4972920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:30.798041105 CEST2022149729185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:34.825680971 CEST4973120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:34.846745014 CEST2022149731185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:35.464900970 CEST4973120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:35.486252069 CEST2022149731185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:36.074258089 CEST4973120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:36.095602036 CEST2022149731185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:40.133157969 CEST4973320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:40.154408932 CEST2022149733185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:40.777792931 CEST4973320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:40.799101114 CEST2022149733185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:41.465327978 CEST4973320221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:41.486330032 CEST2022149733185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:45.500261068 CEST4973420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:45.521605015 CEST2022149734185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:46.075084925 CEST4973420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:46.219413042 CEST2022149734185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:46.778307915 CEST4973420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:46.882353067 CEST2022149734185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:50.889970064 CEST4973620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:50.911468029 CEST2022149736185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:51.419327021 CEST4973620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:51.440475941 CEST2022149736185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:51.950762987 CEST4973620221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:51.972137928 CEST2022149736185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:55.984117031 CEST4973720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:56.005712032 CEST2022149737185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:56.513513088 CEST4973720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:56.534604073 CEST2022149737185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:46:57.044846058 CEST4973720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:46:57.066253901 CEST2022149737185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:01.124372959 CEST4974120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:01.145566940 CEST2022149741185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:01.654562950 CEST4974120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:01.675853968 CEST2022149741185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:02.185838938 CEST4974120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:02.207357883 CEST2022149741185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:06.250999928 CEST4974720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:06.272123098 CEST2022149747185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:06.780174017 CEST4974720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:06.801246881 CEST2022149747185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:07.311245918 CEST4974720221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:07.332509041 CEST2022149747185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:11.368978977 CEST4974820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:11.390117884 CEST2022149748185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:11.905468941 CEST4974820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:11.926462889 CEST2022149748185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:12.436852932 CEST4974820221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:12.458122969 CEST2022149748185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:16.519804001 CEST4974920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:16.541778088 CEST2022149749185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:17.046471119 CEST4974920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:17.067728996 CEST2022149749185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:17.577699900 CEST4974920221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:17.599661112 CEST2022149749185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:21.610826969 CEST4975020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:21.632276058 CEST2022149750185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:22.140849113 CEST4975020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:22.162409067 CEST2022149750185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:22.672000885 CEST4975020221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:22.692967892 CEST2022149750185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:26.704749107 CEST4975120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:26.726562977 CEST2022149751185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:27.234762907 CEST4975120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:27.255563021 CEST2022149751185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:27.766069889 CEST4975120221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:27.787094116 CEST2022149751185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:31.849783897 CEST4975220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:31.871042967 CEST2022149752185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:32.376061916 CEST4975220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:32.397571087 CEST2022149752185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:32.907161951 CEST4975220221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:32.928354025 CEST2022149752185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:36.964173079 CEST4975420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:36.985239983 CEST2022149754185.140.53.138192.168.2.3
                                                          Apr 8, 2021 13:47:37.501451969 CEST4975420221192.168.2.3185.140.53.138
                                                          Apr 8, 2021 13:47:37.522430897 CEST2022149754185.140.53.138192.168.2.3

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 8, 2021 13:45:50.144335985 CEST6493853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:50.156678915 CEST53649388.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:50.897170067 CEST6015253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:50.910936117 CEST53601528.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:52.314327002 CEST5754453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:52.327261925 CEST53575448.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:53.091007948 CEST5598453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:53.103490114 CEST53559848.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:54.141700983 CEST6418553192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:54.154583931 CEST53641858.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:55.250819921 CEST6511053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:55.263695002 CEST53651108.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:56.224210978 CEST5836153192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:56.236684084 CEST53583618.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:57.394275904 CEST6349253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:57.406982899 CEST53634928.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:45:58.531330109 CEST6083153192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:45:58.543525934 CEST53608318.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:00.014127016 CEST6010053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:00.026546955 CEST53601008.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:01.958007097 CEST5319553192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:01.972522974 CEST53531958.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:06.442111969 CEST5014153192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:06.455112934 CEST53501418.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:07.383676052 CEST5302353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:07.395720005 CEST53530238.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:08.155656099 CEST4956353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:08.168270111 CEST53495638.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:09.213501930 CEST5135253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:09.226522923 CEST53513528.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:10.251750946 CEST5934953192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:10.264487028 CEST53593498.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:12.506422997 CEST5708453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:12.519306898 CEST53570848.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:15.063283920 CEST5882353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:15.076936960 CEST53588238.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:24.543615103 CEST5756853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:24.555962086 CEST53575688.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:29.385437965 CEST5054053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:29.405744076 CEST53505408.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:31.097193003 CEST5436653192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:31.136003017 CEST53543668.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:34.811719894 CEST5303453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:34.824659109 CEST53530348.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:37.878189087 CEST5776253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:37.897670031 CEST53577628.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:40.119041920 CEST5543553192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:40.131942034 CEST53554358.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:46:48.656281948 CEST5071353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:46:48.682682037 CEST53507138.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:00.486263990 CEST5613253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:00.499092102 CEST53561328.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:01.103029013 CEST5898753192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:01.123177052 CEST53589878.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:04.009078979 CEST5657953192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:04.027581930 CEST53565798.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:06.233858109 CEST6063353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:06.249541044 CEST53606338.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:11.354652882 CEST6129253192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:11.367309093 CEST53612928.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:31.827198982 CEST6361953192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:31.839972019 CEST53636198.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:35.584381104 CEST6493853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:35.597028971 CEST53649388.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:36.942032099 CEST6194653192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:36.962601900 CEST53619468.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:37.557959080 CEST6491053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:37.584523916 CEST53649108.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:47:42.070487976 CEST5212353192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:47:42.083476067 CEST53521238.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:02.458168983 CEST5613053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:02.479005098 CEST53561308.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:07.568263054 CEST5633853192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:07.581543922 CEST53563388.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:12.692738056 CEST5942053192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:12.712941885 CEST53594208.8.8.8192.168.2.3
                                                          Apr 8, 2021 13:48:33.091295958 CEST5878453192.168.2.38.8.8.8
                                                          Apr 8, 2021 13:48:33.105195999 CEST53587848.8.8.8192.168.2.3

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Apr 8, 2021 13:46:29.385437965 CEST192.168.2.38.8.8.80x75c3Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:34.811719894 CEST192.168.2.38.8.8.80x3bdbStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:40.119041920 CEST192.168.2.38.8.8.80x4ab7Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:01.103029013 CEST192.168.2.38.8.8.80x8c2cStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:06.233858109 CEST192.168.2.38.8.8.80xef0bStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:11.354652882 CEST192.168.2.38.8.8.80xcf57Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:31.827198982 CEST192.168.2.38.8.8.80x416Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:36.942032099 CEST192.168.2.38.8.8.80xa026Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:42.070487976 CEST192.168.2.38.8.8.80x5787Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:02.458168983 CEST192.168.2.38.8.8.80x9563Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:07.568263054 CEST192.168.2.38.8.8.80x77a0Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:12.692738056 CEST192.168.2.38.8.8.80xe19fStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:33.091295958 CEST192.168.2.38.8.8.80x4ee7Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Apr 8, 2021 13:46:29.405744076 CEST8.8.8.8192.168.2.30x75c3No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:34.824659109 CEST8.8.8.8192.168.2.30x3bdbNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:46:40.131942034 CEST8.8.8.8192.168.2.30x4ab7No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:01.123177052 CEST8.8.8.8192.168.2.30x8c2cNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:06.249541044 CEST8.8.8.8192.168.2.30xef0bNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:11.367309093 CEST8.8.8.8192.168.2.30xcf57No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:31.839972019 CEST8.8.8.8192.168.2.30x416No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:36.962601900 CEST8.8.8.8192.168.2.30xa026No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:47:42.083476067 CEST8.8.8.8192.168.2.30x5787No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:02.479005098 CEST8.8.8.8192.168.2.30x9563No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:07.581543922 CEST8.8.8.8192.168.2.30x77a0No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:12.712941885 CEST8.8.8.8192.168.2.30xe19fNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                          Apr 8, 2021 13:48:33.105195999 CEST8.8.8.8192.168.2.30x4ee7No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)

                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:13:45:55
                                                          Start date:08/04/2021
                                                          Path:C:\Users\user\Desktop\NEW_ORDER.pdf.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\NEW_ORDER.pdf.exe'
                                                          Imagebase:0x180000
                                                          File size:695808 bytes
                                                          MD5 hash:5E618064ECE7E7AE38AF0DC9AA5A5559
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.227237084.00000000035EC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.223660609.0000000002575000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:13:46:07
                                                          Start date:08/04/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rrnBESjNXy' /XML 'C:\Users\user\AppData\Local\Temp\tmp3114.tmp'
                                                          Imagebase:0x1120000
                                                          File size:185856 bytes
                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:13:46:08
                                                          Start date:08/04/2021
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6b2800000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:13:46:08
                                                          Start date:08/04/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                          Imagebase:0xcd0000
                                                          File size:45152 bytes
                                                          MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.468190414.0000000005830000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.468713610.0000000006230000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.458836428.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.466700290.0000000004019000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          Reputation:high

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >