Loading ...

Play interactive tourEdit tour

Analysis Report URGENTPURCHASEORDER.pdf.exe

Overview

General Information

Sample Name:URGENTPURCHASEORDER.pdf.exe
Analysis ID:384939
MD5:5bee945f3539cde8ab9b042587aa2055
SHA1:5387b06c509be731ce77ecab9719b68a8de1acf5
SHA256:d060635884dda22139a083da8e1caff1c05f41f3b3ca36d901894c839e22243d
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • URGENTPURCHASEORDER.pdf.exe (PID: 5596 cmdline: 'C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe' MD5: 5BEE945F3539CDE8AB9B042587AA2055)
    • schtasks.exe (PID: 2792 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 1724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 6036 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xff8d:$x1: NanoCore.ClientPluginHost
    • 0xffca:$x2: IClientNetworkHost
    • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 14 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      4.2.RegSvcs.exe.5320000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      4.2.RegSvcs.exe.5320000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      4.2.RegSvcs.exe.3ebb146.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0x145e3:$x1: NanoCore.ClientPluginHost
      • 0x2d0af:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      • 0x14610:$x2: IClientNetworkHost
      • 0x2d0dc:$x2: IClientNetworkHost
      4.2.RegSvcs.exe.3ebb146.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x145e3:$x2: NanoCore.ClientPluginHost
      • 0x2d0af:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0x156be:$s4: PipeCreated
      • 0x2e18a:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      • 0x145fd:$s5: IClientLoggingHost
      • 0x2d0c9:$s5: IClientLoggingHost
      4.2.RegSvcs.exe.3ebb146.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 32 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6036, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe' , ParentImage: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe, ParentProcessId: 5596, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp', ProcessId: 2792

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "6f656d69-7475-8807-1300-000c0a4c", "Domain1": "185.140.53.138", "Domain2": "wealth2021.ddns.net", "Port": 20221, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for submitted fileShow sources
        Source: URGENTPURCHASEORDER.pdf.exeVirustotal: Detection: 26%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPE
        Source: 4.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 4.2.RegSvcs.exe.5330000.8.unpackAvira: Label: TR/NanoCore.fadte
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: wealth2021.ddns.net
        Source: Malware configuration extractorURLs: 185.140.53.138
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: wealth2021.ddns.net
        Source: global trafficTCP traffic: 192.168.2.3:49719 -> 185.140.53.138:20221
        Source: Joe Sandbox ViewIP Address: 185.140.53.138 185.140.53.138
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownDNS traffic detected: queries for: wealth2021.ddns.net
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmp, URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207529567.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244242727.0000000003378000.00000004.00000001.sdmp, URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244148891.00000000032C1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244242727.0000000003378000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.243967401.0000000001917000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207232444.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207205164.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.209079914.000000000628C000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cny
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207529567.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comlic
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.208137460.000000000629B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comn
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: URGENTPURCHASEORDER.pdf.exeString found in binary or memory: https://discord.gg/uMe7S9Q
        Source: URGENTPURCHASEORDER.pdf.exeString found in binary or memory: https://github.com/owhenky/IViewBasic
        Source: URGENTPURCHASEORDER.pdf.exeString found in binary or memory: https://github.com/owhenky/IViewBasic5https://discord.gg/uMe7S9QU495374727563747572616C436F6D7061726
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.243707217.0000000001528000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: RegSvcs.exe, 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5320000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 4.2.RegSvcs.exe.2e9ccfc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: URGENTPURCHASEORDER.pdf.exe
        Source: initial sampleStatic PE information: Filename: URGENTPURCHASEORDER.pdf.exe
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07875ACC NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_00EBC0EF
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_00EB4DCA
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_00EBECCE
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_00EB79AB
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_018FB264
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_018FDF50
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_018FC2B0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_018FB258
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_018F9990
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03225340
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03225A58
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03226070
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03220040
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032288CC
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03226F58
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_0322A7A8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03225330
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03226B09
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03226B18
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032263E8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032263F8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03228A08
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03225A48
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03227183
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032271EA
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032219C7
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032271DB
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032219D8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03220006
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03226062
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03226F48
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03222EF0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03222EDF
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03223508
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03221CA0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03221CB0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032214E8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_032214F8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_0787E5A0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_078704E0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07877280
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07874098
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07875ED8
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07877CA0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07873CB0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07876AE0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07877722
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07877730
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07877488
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07877270
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_0787B1E2
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_0787B1F0
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_07874088
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_00EB356B
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02C7E480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02C7E471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02C7BBD4
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02E49788
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02E4F5F8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02E4A610
        Source: URGENTPURCHASEORDER.pdf.exeBinary or memory string: OriginalFilename vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.253939099.000000000F360000.00000002.00000001.sdmpBinary or memory string: originalfilename vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.253939099.000000000F360000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.243274591.0000000000EB2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIVectorViewToIBindableVectorViewAdapter.exe: vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.253061420.0000000009170000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.252298067.0000000007A10000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.243707217.0000000001528000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.252266939.0000000007880000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.253732185.000000000F270000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exeBinary or memory string: OriginalFilenameIVectorViewToIBindableVectorViewAdapter.exe: vs URGENTPURCHASEORDER.pdf.exe
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5320000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5320000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 4.2.RegSvcs.exe.2e9ccfc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.2e9ccfc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: ewIkYvfY.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@10/1
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\ewIkYvfY.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1724:120:WilError_01
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\utKpvRYeYh
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ae697278-0563-480d-a326-4f0ab2164ba0}
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmpD681.tmpJump to behavior
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: URGENTPURCHASEORDER.pdf.exeVirustotal: Detection: 26%
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile read: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe 'C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe'
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp'
        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp'
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: URGENTPURCHASEORDER.pdf.exeStatic PE information: 0xEDF3B22F [Tue Jul 3 16:24:15 2096 UTC]
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_00EBF329 push cs; ret
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeCode function: 0_2_03220CB2 pushfd ; iretd
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02E4A20C push FFFFFF8Bh; iretd
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02E469F8 pushad ; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.84426548095
        Source: initial sampleStatic PE information: section name: .text entropy: 7.84426548095
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 4.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile created: C:\Users\user\AppData\Roaming\ewIkYvfY.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: URGENTPURCHASEORDER.pdf.exe
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: URGENTPURCHASEORDER.pdf.exe PID: 5596, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4460
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5221
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: foregroundWindowGot 885
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe TID: 6132Thread sleep time: -103764s >= -30000s
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe TID: 5604Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeThread delayed: delay time: 103764
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: RegSvcs.exe, 00000004.00000002.481804862.00000000067D0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.253258204.0000000009263000.00000004.00000001.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\.
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: RegSvcs.exe, 00000004.00000002.481804862.00000000067D0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegSvcs.exe, 00000004.00000002.481804862.00000000067D0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: RegSvcs.exe, 00000004.00000002.481804862.00000000067D0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DEF008
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp'
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: RegSvcs.exe, 00000004.00000002.481684048.00000000062ED000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000004.00000002.476887590.0000000002EDC000.00000004.00000001.sdmpBinary or memory string: Program Managerd
        Source: RegSvcs.exe, 00000004.00000002.476183384.0000000001790000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000004.00000002.476183384.0000000001790000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegSvcs.exe, 00000004.00000002.476887590.0000000002EDC000.00000004.00000001.sdmpBinary or memory string: Program Manager0
        Source: RegSvcs.exe, 00000004.00000002.476183384.0000000001790000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: RegSvcs.exe, 00000004.00000002.481792108.000000000654E000.00000004.00000010.sdmpBinary or memory string: lProgram Manager
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: RegSvcs.exe, 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6036, type: MEMORY
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebb146.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5334629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ebff7c.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.5330000.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.RegSvcs.exe.3ec45a5.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.URGENTPURCHASEORDER.pdf.exe.43d05d8.2.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection212Masquerading11Input Capture21Security Software Discovery111Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information13Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        URGENTPURCHASEORDER.pdf.exe26%VirustotalBrowse
        URGENTPURCHASEORDER.pdf.exe14%ReversingLabsByteCode-MSIL.Trojan.Taskun

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\ewIkYvfY.exe14%ReversingLabsByteCode-MSIL.Trojan.Taskun

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        4.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        4.2.RegSvcs.exe.5330000.8.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        wealth2021.ddns.net0%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://www.fonts.comc0%URL Reputationsafe
        http://www.fonts.comc0%URL Reputationsafe
        http://www.fonts.comc0%URL Reputationsafe
        http://www.fonts.comc0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        https://discord.gg/uMe7S9Q0%Avira URL Cloudsafe
        http://www.tiro.comn0%URL Reputationsafe
        http://www.tiro.comn0%URL Reputationsafe
        http://www.tiro.comn0%URL Reputationsafe
        http://www.tiro.comn0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.com0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.tiro.comlic0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.fontbureau.coma0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        wealth2021.ddns.net0%VirustotalBrowse
        wealth2021.ddns.net0%Avira URL Cloudsafe
        http://www.founder.com.cn/cny0%Avira URL Cloudsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        185.140.53.1380%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        wealth2021.ddns.net
        185.140.53.138
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        wealth2021.ddns.nettrue
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        185.140.53.138true
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.apache.org/licenses/LICENSE-2.0URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
          high
          http://www.fontbureau.comURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.com/designersGURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designers/?URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                high
                http://www.fonts.comcURGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207205164.000000000629B000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.founder.com.cn/cn/bTheURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://discord.gg/uMe7S9QURGENTPURCHASEORDER.pdf.exefalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers?URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                  high
                  http://www.tiro.comnURGENTPURCHASEORDER.pdf.exe, 00000000.00000003.208137460.000000000629B000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://github.com/owhenky/IViewBasic5https://discord.gg/uMe7S9QU495374727563747572616C436F6D7061726URGENTPURCHASEORDER.pdf.exefalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244242727.0000000003378000.00000004.00000001.sdmpfalse
                      high
                      http://www.tiro.comURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comlicURGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207529567.000000000629B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.krURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comaURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.243967401.0000000001917000.00000004.00000040.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmpfalse
                          high
                          http://www.carterandcone.comlURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmp, URGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207529567.000000000629B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cnyURGENTPURCHASEORDER.pdf.exe, 00000000.00000003.209079914.000000000628C000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                                high
                                http://www.fonts.comURGENTPURCHASEORDER.pdf.exe, 00000000.00000003.207232444.000000000629B000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244242727.0000000003378000.00000004.00000001.sdmp, URGENTPURCHASEORDER.pdf.exe, 00000000.00000002.244148891.00000000032C1000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.sakkal.comURGENTPURCHASEORDER.pdf.exe, 00000000.00000002.251443190.0000000007492000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://github.com/owhenky/IViewBasicURGENTPURCHASEORDER.pdf.exefalse
                                      high

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      185.140.53.138
                                      wealth2021.ddns.netSweden
                                      209623DAVID_CRAIGGGtrue

                                      General Information

                                      Joe Sandbox Version:31.0.0 Emerald
                                      Analysis ID:384939
                                      Start date:10.04.2021
                                      Start time:13:21:11
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 7m 56s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:URGENTPURCHASEORDER.pdf.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:29
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@6/5@10/1
                                      EGA Information:Failed
                                      HDC Information:
                                      • Successful, ratio: 0% (good quality ratio 0%)
                                      • Quality average: 45.5%
                                      • Quality standard deviation: 45.5%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .exe
                                      Warnings:
                                      Show All
                                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                      • TCP Packets have been reduced to 100
                                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                      • Excluded IPs from analysis (whitelisted): 40.88.32.150, 168.61.161.212, 104.43.139.144, 92.122.144.200, 20.82.209.183, 52.255.188.83, 23.10.249.43, 23.10.249.26, 20.54.26.129, 104.83.87.75, 104.83.127.80, 52.147.198.201
                                      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, e15275.g.akamaiedge.net, arc.msn.com, cdn.onenote.net.edgekey.net, skypedataprdcoleus15.cloudapp.net, wildcard.weather.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, fs.microsoft.com, ris-prod.trafficmanager.net, tile-service.weather.microsoft.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, e1553.dspg.akamaiedge.net
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      13:22:06API Interceptor1x Sleep call for process: URGENTPURCHASEORDER.pdf.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      185.140.53.138NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                        NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                          Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                            URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                              Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                1PH37n4Gva.exeGet hashmaliciousBrowse
                                                  35dbds3GQG.exeGet hashmaliciousBrowse
                                                    QXJGE2LOdP.exeGet hashmaliciousBrowse
                                                      O4m3hDFNbh.exeGet hashmaliciousBrowse
                                                        nrv_remittance#U007eorder#U007epayment.exeGet hashmaliciousBrowse
                                                          NEW ORDER REQUEST_EXPORT005JKL DOC.exeGet hashmaliciousBrowse
                                                            WIRE COPY ORDER T104484_PP.exeGet hashmaliciousBrowse
                                                              71AXBkD1wA.exeGet hashmaliciousBrowse

                                                                Domains

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                wealth2021.ddns.netNEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138

                                                                ASN

                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                DAVID_CRAIGGGTRACKING UPDATE.exeGet hashmaliciousBrowse
                                                                • 185.140.53.10
                                                                NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                samples ordered 024791.exeGet hashmaliciousBrowse
                                                                • 185.140.53.69
                                                                PO.20210704_quick shipment.exeGet hashmaliciousBrowse
                                                                • 185.140.53.69
                                                                ANS_309487487_#049844874.exeGet hashmaliciousBrowse
                                                                • 185.140.53.9
                                                                tmp2.exeGet hashmaliciousBrowse
                                                                • 185.140.53.71
                                                                tmp.exeGet hashmaliciousBrowse
                                                                • 185.140.53.71
                                                                NEW_ORDER.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                Doc_58YJ54-521DERG701-55YH701.exeGet hashmaliciousBrowse
                                                                • 185.140.53.230
                                                                Quotation_Request.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                FRQ_05694 revised quantity.exeGet hashmaliciousBrowse
                                                                • 185.140.53.69
                                                                INVOICE 15112021.xlsxGet hashmaliciousBrowse
                                                                • 185.140.53.130
                                                                URGENT_ORDER.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                IMG-001982-AW00173-SSE73I.exeGet hashmaliciousBrowse
                                                                • 185.140.53.230
                                                                FYI-Orderimg.exeGet hashmaliciousBrowse
                                                                • 185.140.53.67
                                                                Purchase_Order.pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.138
                                                                PO-94765809570-Order pdf.exeGet hashmaliciousBrowse
                                                                • 185.140.53.7
                                                                Commercial E-invoice.exeGet hashmaliciousBrowse
                                                                • 185.140.53.137
                                                                Order23032021.xlsGet hashmaliciousBrowse
                                                                • 185.140.53.130
                                                                ZcQwvgqtuQ.exeGet hashmaliciousBrowse
                                                                • 91.193.75.245

                                                                JA3 Fingerprints

                                                                No context

                                                                Dropped Files

                                                                No context

                                                                Created / dropped Files

                                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\URGENTPURCHASEORDER.pdf.exe.log
                                                                Process:C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):1314
                                                                Entropy (8bit):5.350128552078965
                                                                Encrypted:false
                                                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                Malicious:true
                                                                Reputation:high, very likely benign file
                                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                C:\Users\user\AppData\Local\Temp\tmpD681.tmp
                                                                Process:C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1641
                                                                Entropy (8bit):5.189890199243021
                                                                Encrypted:false
                                                                SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBcYtn:cbh47TlNQ//rydbz9I3YODOLNdq3R
                                                                MD5:12B6114F2BF336F51EE0112E9965540D
                                                                SHA1:F9AABA57DB158925CA36F78C1A0AED4BE36B53B6
                                                                SHA-256:E665058AB5A063BE4A15325C11BD0BCCEE9DDFF7002194F98F79107E06BEA164
                                                                SHA-512:350017E010C9451F94912CEE68146592E259342C0FCBD121515325DA71C95EE3C35781C70703E3A1BB624E42AC3FB0ECD41701C48DF23FA6E3AE65591C13F05A
                                                                Malicious:true
                                                                Reputation:low
                                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                File Type:ISO-8859 text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):3.0
                                                                Encrypted:false
                                                                SSDEEP:3:4Z9t:UP
                                                                MD5:47BCB235EEA97B8D197D5C4357FC443C
                                                                SHA1:F9720AD5BF18734D11FCEDA8BC5DB233529FB217
                                                                SHA-256:AEDC8DB6758A4EC72C18605F7E428E40E119CCC0E2498FD8384CD7F348B6DF17
                                                                SHA-512:D8CADE74EC2EE405ECA8C47CB67B240BEA2D61EC64C6DAFDBD3A0761CD9BA905649B7DA9F9D52FE33C6B1FE36F04C4A714C79A6CE361DE5A827443CBA5BE2E5A
                                                                Malicious:true
                                                                Reputation:low
                                                                Preview: ..!X^..H
                                                                C:\Users\user\AppData\Roaming\ewIkYvfY.exe
                                                                Process:C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):567296
                                                                Entropy (8bit):7.795819523197301
                                                                Encrypted:false
                                                                SSDEEP:12288:0vXIPuU4iLCfVBfMog/U3Ku75fKo11D7wEb3vnKC+nx/sAUF:04o4CfVBf3DV1YETK1n6
                                                                MD5:5BEE945F3539CDE8AB9B042587AA2055
                                                                SHA1:5387B06C509BE731CE77ECAB9719B68A8DE1ACF5
                                                                SHA-256:D060635884DDA22139A083DA8E1CAFF1C05F41F3B3CA36D901894C839E22243D
                                                                SHA-512:4F2E4C621BD0B14F4E86CD6E400A46B9A35ADFB2036D6320EE7959B274B45E7D96C4AFEE5168F13DB6BFE62FEF1A3C5CA1163404C6B90A1B8188E40DA5618B89
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 14%
                                                                Reputation:low
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.................P..Z...L......rx... ........@.. ....................................@................................. x..O........H...........................x............................................... ............... ..H............text...xX... ...Z.................. ..`.rsrc....H.......J...\..............@..@.reloc..............................@..B................Tx......H....... ................v..8............................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                                C:\Users\user\AppData\Roaming\ewIkYvfY.exe:Zone.Identifier
                                                                Process:C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                Static File Info

                                                                General

                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):7.795819523197301
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                File name:URGENTPURCHASEORDER.pdf.exe
                                                                File size:567296
                                                                MD5:5bee945f3539cde8ab9b042587aa2055
                                                                SHA1:5387b06c509be731ce77ecab9719b68a8de1acf5
                                                                SHA256:d060635884dda22139a083da8e1caff1c05f41f3b3ca36d901894c839e22243d
                                                                SHA512:4f2e4c621bd0b14f4e86cd6e400a46b9a35adfb2036d6320ee7959b274b45e7d96c4afee5168f13db6bfe62fef1a3c5ca1163404c6b90a1b8188e40da5618b89
                                                                SSDEEP:12288:0vXIPuU4iLCfVBfMog/U3Ku75fKo11D7wEb3vnKC+nx/sAUF:04o4CfVBf3DV1YETK1n6
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.................P..Z...L......rx... ........@.. ....................................@................................

                                                                File Icon

                                                                Icon Hash:60d088f59092cc31

                                                                Static PE Info

                                                                General

                                                                Entrypoint:0x487872
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                Time Stamp:0xEDF3B22F [Tue Jul 3 16:24:15 2096 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:v4.0.30319
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                Entrypoint Preview

                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al

                                                                Data Directories

                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x878200x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x48fc.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x878040x1c.text
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                Sections

                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x858780x85a00False0.898795603368data7.84426548095IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x880000x48fc0x4a00False0.524229307432data5.3654546561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x8e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                Resources

                                                                NameRVASizeTypeLanguageCountry
                                                                RT_ICON0x881300x4228dBase III DBT, version number 0, next free block index 40
                                                                RT_GROUP_ICON0x8c3580x14data
                                                                RT_VERSION0x8c36c0x3a4data
                                                                RT_MANIFEST0x8c7100x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                Imports

                                                                DLLImport
                                                                mscoree.dll_CorExeMain

                                                                Version Infos

                                                                DescriptionData
                                                                Translation0x0000 0x04b0
                                                                LegalCopyrightCopyright 2019
                                                                Assembly Version1.0.0.0
                                                                InternalNameIVectorViewToIBindableVectorViewAdapter.exe
                                                                FileVersion1.0.0.0
                                                                CompanyName
                                                                LegalTrademarks
                                                                Comments
                                                                ProductNameImage Viewer
                                                                ProductVersion1.0.0.0
                                                                FileDescriptionImage Viewer
                                                                OriginalFilenameIVectorViewToIBindableVectorViewAdapter.exe

                                                                Network Behavior

                                                                Network Port Distribution

                                                                TCP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Apr 10, 2021 13:22:22.287288904 CEST4971920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:22.308971882 CEST2022149719185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:22.820666075 CEST4971920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:22.843116999 CEST2022149719185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:23.343919992 CEST4971920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:23.365442038 CEST2022149719185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:27.464068890 CEST4972020221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:27.485547066 CEST2022149720185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:27.993031025 CEST4972020221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:28.014736891 CEST2022149720185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:28.524358034 CEST4972020221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:28.545357943 CEST2022149720185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:32.557280064 CEST4972820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:32.578928947 CEST2022149728185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:33.087095976 CEST4972820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:33.108875990 CEST2022149728185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:33.622298002 CEST4972820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:33.645001888 CEST2022149728185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:37.795810938 CEST4973220221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:37.817807913 CEST2022149732185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:38.509537935 CEST4973220221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:38.530989885 CEST2022149732185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:39.197052002 CEST4973220221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:39.218286991 CEST2022149732185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:43.254087925 CEST4973320221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:43.275274992 CEST2022149733185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:43.806822062 CEST4973320221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:43.828934908 CEST2022149733185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:44.509994984 CEST4973320221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:44.531290054 CEST2022149733185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:48.558897018 CEST4973420221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:48.579993010 CEST2022149734185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:49.197880030 CEST4973420221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:49.220746994 CEST2022149734185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:49.807328939 CEST4973420221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:49.828644991 CEST2022149734185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:54.730881929 CEST4973620221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:54.752170086 CEST2022149736185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:55.307725906 CEST4973620221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:55.328707933 CEST2022149736185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:22:56.010915995 CEST4973620221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:22:56.032346010 CEST2022149736185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:00.044962883 CEST4973820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:00.065983057 CEST2022149738185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:00.573813915 CEST4973820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:00.594989061 CEST2022149738185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:01.105101109 CEST4973820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:01.126172066 CEST2022149738185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:05.139595985 CEST4973920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:05.160883904 CEST2022149739185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:05.668185949 CEST4973920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:05.689872980 CEST2022149739185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:06.199460983 CEST4973920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:06.220621109 CEST2022149739185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:10.290072918 CEST4974120221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:10.311222076 CEST2022149741185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:10.824913979 CEST4974120221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:10.845984936 CEST2022149741185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:11.356008053 CEST4974120221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:11.376995087 CEST2022149741185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:15.455238104 CEST4974920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:15.477463007 CEST2022149749185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:15.981379032 CEST4974920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:16.002779961 CEST2022149749185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:16.512638092 CEST4974920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:16.533919096 CEST2022149749185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:20.637798071 CEST4975520221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:20.659238100 CEST2022149755185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:21.169378996 CEST4975520221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:21.190633059 CEST2022149755185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:21.700553894 CEST4975520221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:21.721812010 CEST2022149755185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:25.736346006 CEST4975620221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:25.759175062 CEST2022149756185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:26.263613939 CEST4975620221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:26.284928083 CEST2022149756185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:26.794728994 CEST4975620221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:26.815633059 CEST2022149756185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:30.844152927 CEST4975720221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:30.865502119 CEST2022149757185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:31.373395920 CEST4975720221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:31.395292044 CEST2022149757185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:31.904576063 CEST4975720221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:31.927583933 CEST2022149757185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:35.938903093 CEST4975820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:35.961844921 CEST2022149758185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:36.467547894 CEST4975820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:36.488888979 CEST2022149758185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:36.998689890 CEST4975820221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:37.019943953 CEST2022149758185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:41.084667921 CEST4975920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:41.105856895 CEST2022149759185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:41.608500004 CEST4975920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:41.630117893 CEST2022149759185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:42.139764071 CEST4975920221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:42.160918951 CEST2022149759185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:46.200344086 CEST4976020221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:46.221507072 CEST2022149760185.140.53.138192.168.2.3
                                                                Apr 10, 2021 13:23:46.733905077 CEST4976020221192.168.2.3185.140.53.138
                                                                Apr 10, 2021 13:23:46.754827976 CEST2022149760185.140.53.138192.168.2.3

                                                                UDP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Apr 10, 2021 13:21:53.500550032 CEST5598453192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:53.513597965 CEST53559848.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:54.275424004 CEST6418553192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:54.288847923 CEST53641858.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:54.944519997 CEST6511053192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:54.957844019 CEST53651108.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:56.026130915 CEST5836153192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:56.039885998 CEST53583618.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:56.771668911 CEST6349253192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:56.787292957 CEST53634928.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:57.509826899 CEST6083153192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:57.522052050 CEST53608318.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:58.361676931 CEST6010053192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:58.375561953 CEST53601008.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:21:59.223104000 CEST5319553192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:21:59.236020088 CEST53531958.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:00.034452915 CEST5014153192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:00.047821045 CEST53501418.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:00.735707045 CEST5302353192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:00.748488903 CEST53530238.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:01.573005915 CEST4956353192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:01.586170912 CEST53495638.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:30.413235903 CEST5135253192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:30.440238953 CEST53513528.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:31.558715105 CEST5934953192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:31.571634054 CEST53593498.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:32.466567039 CEST5708453192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:32.481575966 CEST53570848.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:34.474006891 CEST5882353192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:34.486565113 CEST53588238.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:36.277395964 CEST5756853192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:36.290640116 CEST53575688.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:37.038639069 CEST5054053192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:37.050949097 CEST53505408.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:37.773684025 CEST5436653192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:37.793812037 CEST53543668.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:43.232366085 CEST5303453192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:43.252691984 CEST53530348.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:48.545027971 CEST5776253192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:48.557930946 CEST53577628.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:48.800945044 CEST5543553192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:48.820245028 CEST53554358.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:22:59.667120934 CEST5071353192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:22:59.693808079 CEST53507138.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:08.325223923 CEST5613253192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:08.337743044 CEST53561328.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:10.266738892 CEST5898753192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:10.286132097 CEST53589878.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:10.366518974 CEST5657953192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:10.376585007 CEST6063353192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:10.384871006 CEST53565798.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:10.395803928 CEST53606338.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:10.719083071 CEST6129253192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:10.731772900 CEST53612928.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:11.349730968 CEST6361953192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:11.362250090 CEST53636198.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:12.461837053 CEST6493853192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:12.474558115 CEST53649388.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:15.402087927 CEST6194653192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:15.415385962 CEST53619468.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:16.398881912 CEST6491053192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:16.417119026 CEST53649108.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:20.551948071 CEST5212353192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:20.564553022 CEST53521238.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:41.069704056 CEST5613053192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:41.082732916 CEST53561308.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:46.179269075 CEST5633853192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:46.198777914 CEST53563388.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:48.412775040 CEST5942053192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:48.424988985 CEST53594208.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:50.471694946 CEST5878453192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:50.504117012 CEST53587848.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:23:51.332163095 CEST6397853192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:23:51.345220089 CEST53639788.8.8.8192.168.2.3
                                                                Apr 10, 2021 13:24:11.721404076 CEST6293853192.168.2.38.8.8.8
                                                                Apr 10, 2021 13:24:11.733901978 CEST53629388.8.8.8192.168.2.3

                                                                DNS Queries

                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                Apr 10, 2021 13:22:37.773684025 CEST192.168.2.38.8.8.80xcc44Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:22:43.232366085 CEST192.168.2.38.8.8.80x9f91Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:22:48.545027971 CEST192.168.2.38.8.8.80x686cStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:10.266738892 CEST192.168.2.38.8.8.80xd838Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:15.402087927 CEST192.168.2.38.8.8.80xee14Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:20.551948071 CEST192.168.2.38.8.8.80x1cc4Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:41.069704056 CEST192.168.2.38.8.8.80xc65aStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:46.179269075 CEST192.168.2.38.8.8.80xd121Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:51.332163095 CEST192.168.2.38.8.8.80xa7beStandard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:24:11.721404076 CEST192.168.2.38.8.8.80xac05Standard query (0)wealth2021.ddns.netA (IP address)IN (0x0001)

                                                                DNS Answers

                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                Apr 10, 2021 13:22:37.793812037 CEST8.8.8.8192.168.2.30xcc44No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:22:43.252691984 CEST8.8.8.8192.168.2.30x9f91No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:22:48.557930946 CEST8.8.8.8192.168.2.30x686cNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:10.286132097 CEST8.8.8.8192.168.2.30xd838No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:15.415385962 CEST8.8.8.8192.168.2.30xee14No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:20.564553022 CEST8.8.8.8192.168.2.30x1cc4No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:41.082732916 CEST8.8.8.8192.168.2.30xc65aNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:46.198777914 CEST8.8.8.8192.168.2.30xd121No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:23:51.345220089 CEST8.8.8.8192.168.2.30xa7beNo error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)
                                                                Apr 10, 2021 13:24:11.733901978 CEST8.8.8.8192.168.2.30xac05No error (0)wealth2021.ddns.net185.140.53.138A (IP address)IN (0x0001)

                                                                Code Manipulations

                                                                Statistics

                                                                Behavior

                                                                Click to jump to process

                                                                System Behavior

                                                                General

                                                                Start time:13:22:01
                                                                Start date:10/04/2021
                                                                Path:C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\URGENTPURCHASEORDER.pdf.exe'
                                                                Imagebase:0xeb0000
                                                                File size:567296 bytes
                                                                MD5 hash:5BEE945F3539CDE8AB9B042587AA2055
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.244200976.000000000332D000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.244541522.00000000042CC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Reputation:low

                                                                General

                                                                Start time:13:22:16
                                                                Start date:10/04/2021
                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\ewIkYvfY' /XML 'C:\Users\user\AppData\Local\Temp\tmpD681.tmp'
                                                                Imagebase:0x3e0000
                                                                File size:185856 bytes
                                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:13:22:18
                                                                Start date:10/04/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff6b2800000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:13:22:18
                                                                Start date:10/04/2021
                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                Imagebase:0xa00000
                                                                File size:45152 bytes
                                                                MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.481258599.0000000005320000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.472813842.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.476797525.0000000002E71000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.480543359.0000000003EAC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.481272072.0000000005330000.00000004.00000001.sdmp, Author: Joe Security
                                                                Reputation:high

                                                                Disassembly

                                                                Code Analysis

                                                                Reset < >