Loading ...

Play interactive tourEdit tour

Windows Analysis Report ORDER TSA-A090621B.exe

Overview

General Information

Sample Name:ORDER TSA-A090621B.exe
Analysis ID:451105
MD5:f5d3b895f4109e09f8918fc52147d154
SHA1:e4fe29023bd9af1916d7c12197949ddaed424e8b
SHA256:9713a28e0645cc77089dfd921118db8827de0a8b7e8196d653da2002646bd3cf
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • ORDER TSA-A090621B.exe (PID: 3980 cmdline: 'C:\Users\user\Desktop\ORDER TSA-A090621B.exe' MD5: F5D3B895F4109E09F8918FC52147D154)
    • ORDER TSA-A090621B.exe (PID: 5464 cmdline: C:\Users\user\Desktop\ORDER TSA-A090621B.exe MD5: F5D3B895F4109E09F8918FC52147D154)
    • ORDER TSA-A090621B.exe (PID: 5692 cmdline: C:\Users\user\Desktop\ORDER TSA-A090621B.exe MD5: F5D3B895F4109E09F8918FC52147D154)
  • dhcpmon.exe (PID: 5228 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: F5D3B895F4109E09F8918FC52147D154)
    • dhcpmon.exe (PID: 2476 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: F5D3B895F4109E09F8918FC52147D154)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5fee:$x1: NanoCore.ClientPluginHost
  • 0x602b:$x2: IClientNetworkHost
00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5fee:$x2: NanoCore.ClientPluginHost
  • 0x9441:$s4: PipeCreated
  • 0x6018:$s5: IClientLoggingHost
00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x8ba5:$x1: NanoCore.ClientPluginHost
  • 0x8bd2:$x2: IClientNetworkHost
00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x8ba5:$x2: NanoCore.ClientPluginHost
  • 0x9b74:$s2: FileCommand
  • 0xe576:$s4: PipeCreated
  • 0x8bbf:$s5: IClientLoggingHost
00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    Click to see the 46 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x59eb:$x1: NanoCore.ClientPluginHost
    • 0x5b48:$x2: IClientNetworkHost
    6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x59eb:$x2: NanoCore.ClientPluginHost
    • 0x6941:$s3: PipeExists
    • 0x5be1:$s4: PipeCreated
    • 0x5a05:$s5: IClientLoggingHost
    6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x5b99:$x1: NanoCore.ClientPluginHost
    • 0x5bb3:$x2: IClientNetworkHost
    6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x5b99:$x2: NanoCore.ClientPluginHost
    • 0x6bce:$s4: PipeCreated
    • 0x5b86:$s5: IClientLoggingHost
    6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xb184:$x1: NanoCore.ClientPluginHost
    • 0xb1b1:$x2: IClientNetworkHost
    Click to see the 126 entries

    Sigma Overview

    AV Detection:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ORDER TSA-A090621B.exe, ProcessId: 5692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c9622013-90b3-4810-9b2a-2fbba172", "Domain1": "185.140.53.253", "Domain2": "dedicatedlambo9.ddns.net", "Port": 1604, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Multi AV Scanner detection for domain / URLShow sources
    Source: dedicatedlambo9.ddns.netVirustotal: Detection: 6%Perma Link
    Source: dedicatedlambo9.ddns.netVirustotal: Detection: 6%Perma Link
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 17%
    Multi AV Scanner detection for submitted fileShow sources
    Source: ORDER TSA-A090621B.exeVirustotal: Detection: 20%Perma Link
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY
    Machine Learning detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Machine Learning detection for sampleShow sources
    Source: ORDER TSA-A090621B.exeJoe Sandbox ML: detected
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpackAvira: Label: TR/NanoCore.fadte
    Source: 21.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpackAvira: Label: TR/NanoCore.fadte
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: ORDER TSA-A090621B.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: ORDER TSA-A090621B.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: dedicatedlambo9.ddns.net
    Source: Malware configuration extractorURLs: 185.140.53.253
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: dedicatedlambo9.ddns.net
    Source: global trafficTCP traffic: 192.168.2.3:49725 -> 185.140.53.253:1604
    Source: global trafficTCP traffic: 192.168.2.3:49732 -> 84.38.133.182:1604
    Source: Joe Sandbox ViewIP Address: 185.140.53.253 185.140.53.253
    Source: Joe Sandbox ViewASN Name: DATACLUB-NL DATACLUB-NL
    Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.253
    Source: unknownDNS traffic detected: queries for: dedicatedlambo9.ddns.net
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: http://google.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223095895.0000000005EEE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/c
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223387249.0000000005EC9000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmla-d
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomF
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdr
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comonyd
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comueTF
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219349774.000000000163D000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219531458.0000000005EB7000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn#
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219748597.0000000005EB8000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/s
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnA
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnU
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.219326151.0000000005EBE000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnd
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.224689665.0000000005EC3000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmp, ORDER TSA-A090621B.exe, 00000000.00000003.221519161.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/71
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/V
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0d
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/_
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/arge
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/71
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/M
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ns.
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/r
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vau
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vnoi
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comD
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comc
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comd
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comx.
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comn
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
    Source: ORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.delar
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6af0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b6e8a4.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.79d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.3485ab4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.2a49684.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.5bb0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.6b64c9f.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.495469070.000000000478F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.495497287.00000000047A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Initial sample is a PE file and has a suspicious nameShow sources
    Source: initial sampleStatic PE information: Filename: ORDER TSA-A090621B.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 6_2_017CE471
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 6_2_017CE480
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_010FE471
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_010FE480
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_010FBBD4
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F9F5F8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F99788
    Source: ORDER TSA-A090621B.exe, 00000000.00000000.213493161.0000000000BB0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000005.00000000.276359549.0000000000170000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498918767.0000000006890000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll8 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498626766.00000000064F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000000.277555410.00000000010C0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.486812184.000000000180A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exeBinary or memory string: OriginalFilenameConstructorIn.exeB vs ORDER TSA-A090621B.exe
    Source: ORDER TSA-A090621B.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6af0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6af0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34fd7b4.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34e9178.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b20000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b6e8a4.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b6e8a4.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c70000.35.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b90000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b40000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b10000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.462f65a.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.480ae46.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b00000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.79d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.79d0000.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.3485ab4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.3485ab4.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b60000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7c60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4819276.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.2a49684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.2a49684.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7710000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4795506.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.34dcf30.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.4802017.12.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.5bb0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.5bb0000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.7700000.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.6b64c9f.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.6b64c9f.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.461b02d.9.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 6.2.ORDER TSA-A090621B.exe.460edf9.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.495469070.000000000478F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.495497287.00000000047A6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: ORDER TSA-A090621B.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.6.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@8/8@12/3
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER TSA-A090621B.exe.logJump to behavior
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c9622013-90b3-4810-9b2a-2fbba1723547}
    Source: ORDER TSA-A090621B.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: ORDER TSA-A090621B.exeVirustotal: Detection: 20%
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile read: C:\Users\user\Desktop\ORDER TSA-A090621B.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe 'C:\Users\user\Desktop\ORDER TSA-A090621B.exe'
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
    Source: ORDER TSA-A090621B.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: ORDER TSA-A090621B.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: ORDER TSA-A090621B.exeStatic file information: File size 1102336 > 1048576
    Source: ORDER TSA-A090621B.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10ca00
    Source: ORDER TSA-A090621B.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: ORDER TSA-A090621B.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp
    Source: ORDER TSA-A090621B.exeStatic PE information: 0xD09DABD0 [Thu Nov 28 04:34:24 2080 UTC]
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 5_2_000628FD push ebp; iretd
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeCode function: 6_2_00FB28FD push ebp; iretd
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_006228FD push ebp; iretd
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 21_2_04F969F8 pushad ; retf
    Source: initial sampleStatic PE information: section name: .text entropy: 7.62512581288
    Source: initial sampleStatic PE information: section name: .text entropy: 7.62512581288
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeFile opened: C:\Users\user\Desktop\ORDER TSA-A090621B.exe:Zone.Identifier read attributes | delete
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: threadDelayed 6981
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: threadDelayed 2568
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: foregroundWindowGot 514
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWindow / User API: foregroundWindowGot 612
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exe TID: 5936Thread sleep time: -57864s >= -30000s
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exe TID: 6112Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exe TID: 5032Thread sleep time: -15679732462653109s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4812Thread sleep time: -47899s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5656Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 3748Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 57864
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 47899
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: ORDER TSA-A090621B.exe, dhcpmon.exeBinary or memory string: zE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ]tM5W|Y5fY<YeDL[]nopgyMKX3QZ]tM5WzE[Ti4JD|YJ]s]6e|EIgmYpdl<nfoU[gz45eG<YeDPZeV]WerYHWsYZfGgmTWg4U3EzTqEqVWooe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: ORDER TSA-A090621B.exe, 00000006.00000003.323354141.00000000018C5000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499824118.00000000070F0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess token adjusted: Debug
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Injects a PE file into a foreign processesShow sources
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeMemory written: C:\Users\user\Desktop\ORDER TSA-A090621B.exe base: 400000 value starts with: 4D5A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeProcess created: C:\Users\user\Desktop\ORDER TSA-A090621B.exe C:\Users\user\Desktop\ORDER TSA-A090621B.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.491546202.0000000003591000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.487918215.0000000001E90000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.487918215.0000000001E90000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.491546202.0000000003591000.00000004.00000001.sdmpBinary or memory string: Program Manager8
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.487918215.0000000001E90000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmpBinary or memory string: Program Managert
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.493954778.000000000389C000.00000004.00000001.sdmpBinary or memory string: Program Manager4
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.493633744.0000000003839000.00000004.00000001.sdmpBinary or memory string: Program Manager8]F
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Users\user\Desktop\ORDER TSA-A090621B.exe VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Users\user\Desktop\ORDER TSA-A090621B.exe VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\ORDER TSA-A090621B.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
    Source: ORDER TSA-A090621B.exe, 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e4629.19.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44bd069.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2b136.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a34595.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.ORDER TSA-A090621B.exe.44b8a40.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.dhcpmon.exe.3a2ff6c.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: ORDER TSA-A090621B.exe PID: 5692, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2476, type: MEMORY

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection112Masquerading2Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion21Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    ORDER TSA-A090621B.exe21%VirustotalBrowse
    ORDER TSA-A090621B.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe17%ReversingLabsByteCode-MSIL.Backdoor.NanoCore

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    6.2.ORDER TSA-A090621B.exe.65e0000.18.unpack100%AviraTR/NanoCore.fadteDownload File
    21.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    6.2.ORDER TSA-A090621B.exe.44b8a40.6.unpack100%AviraTR/NanoCore.fadteDownload File
    6.2.ORDER TSA-A090621B.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

    Domains

    SourceDetectionScannerLabelLink
    dedicatedlambo9.ddns.net7%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    dedicatedlambo9.ddns.net7%VirustotalBrowse
    dedicatedlambo9.ddns.net0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.fontbureau.comdr0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
    http://www.tiro.comn0%URL Reputationsafe
    http://www.tiro.comn0%URL Reputationsafe
    http://www.tiro.comn0%URL Reputationsafe
    http://www.founder.com.cn/cnU0%Avira URL Cloudsafe
    http://www.fontbureau.comueTF0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/jp/M0%Avira URL Cloudsafe
    http://www.founder.com.cn/cnA0%Avira URL Cloudsafe
    http://www.sakkal.comx.0%Avira URL Cloudsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.sajatypeworks.comD0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/710%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.fontbureau.coma0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/vau0%Avira URL Cloudsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn/0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/arge0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/Y0d0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/r0%URL Reputationsafe
    http://www.fontbureau.comcomF0%URL Reputationsafe
    http://www.fontbureau.comcomF0%URL Reputationsafe
    http://www.fontbureau.comcomF0%URL Reputationsafe
    http://www.fontbureau.comonyd0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/710%Avira URL Cloudsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.fontbureau.comals0%URL Reputationsafe
    http://www.sakkal.comd0%Avira URL Cloudsafe
    http://www.urwpp.delar0%Avira URL Cloudsafe
    http://www.sajatypeworks.comc0%Avira URL Cloudsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.urwpp.de0%URL Reputationsafe
    http://www.founder.com.cn/cn/s0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/ns.0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/vnoi0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/_0%URL Reputationsafe
    185.140.53.2530%Avira URL Cloudsafe
    http://www.founder.com.cn/cn#0%Avira URL Cloudsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    dedicatedlambo9.ddns.net
    84.38.133.182
    truetrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    dedicatedlambo9.ddns.nettrue
    • 7%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    185.140.53.253true
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.comORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
      high
      http://www.galapagosdesign.com/ORDER TSA-A090621B.exe, 00000000.00000003.224689665.0000000005EC3000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.fontbureau.comdrORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/VORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.tiro.comnORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.founder.com.cn/cnUORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.comueTFORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/jp/MORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.founder.com.cn/cnAORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.sakkal.comx.ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.tiro.comORDER TSA-A090621B.exe, 00000000.00000003.218772474.0000000005ECB000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.sajatypeworks.comDORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/71ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://google.comORDER TSA-A090621B.exe, 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmpfalse
        high
        http://www.jiyu-kobo.co.jp/jp/ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.fontbureau.comaORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.jiyu-kobo.co.jp/vauORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.sajatypeworks.comORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cn/ORDER TSA-A090621B.exe, 00000000.00000003.219878349.0000000005EB6000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnORDER TSA-A090621B.exe, 00000000.00000003.219349774.000000000163D000.00000004.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        unknown
        http://www.jiyu-kobo.co.jp/argeORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.fontbureau.com/designers/frere-jones.htmla-dORDER TSA-A090621B.exe, 00000000.00000003.223387249.0000000005EC9000.00000004.00000001.sdmpfalse
          high
          http://www.jiyu-kobo.co.jp/Y0dORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/rORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comcomFORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comonydORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmp, ORDER TSA-A090621B.exe, 00000000.00000003.221519161.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/jp/71ORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ascendercorp.com/typedesigners.htmlORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comalsORDER TSA-A090621B.exe, 00000000.00000003.224250843.0000000005EB7000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.sakkal.comdORDER TSA-A090621B.exe, 00000000.00000003.222050397.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.urwpp.delarORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comcORDER TSA-A090621B.exe, 00000000.00000003.216916556.0000000005EB3000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.urwpp.deORDER TSA-A090621B.exe, 00000000.00000003.223942585.0000000005EB5000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/sORDER TSA-A090621B.exe, 00000000.00000003.219748597.0000000005EB8000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/ns.ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jiyu-kobo.co.jp/vnoiORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designers/cORDER TSA-A090621B.exe, 00000000.00000003.223095895.0000000005EEE000.00000004.00000001.sdmpfalse
            high
            http://www.jiyu-kobo.co.jp/_ORDER TSA-A090621B.exe, 00000000.00000003.221807307.0000000005EB5000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn#ORDER TSA-A090621B.exe, 00000000.00000003.219531458.0000000005EB7000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.founder.com.cn/cndORDER TSA-A090621B.exe, 00000000.00000003.219326151.0000000005EBE000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            84.38.133.182
            dedicatedlambo9.ddns.netLatvia
            203557DATACLUB-NLtrue
            185.140.53.253
            unknownSweden
            209623DAVID_CRAIGGGtrue

            Private

            IP
            192.168.2.1

            General Information

            Joe Sandbox Version:33.0.0 White Diamond
            Analysis ID:451105
            Start date:20.07.2021
            Start time:08:34:07
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 12m 33s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:ORDER TSA-A090621B.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:25
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@8/8@12/3
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 104.43.193.48, 52.147.198.201, 20.82.210.154, 23.211.4.86, 13.88.21.125, 40.88.32.150, 40.112.88.60, 173.222.108.210, 173.222.108.226, 80.67.82.235, 80.67.82.211
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dscg3.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            08:35:27API Interceptor800x Sleep call for process: ORDER TSA-A090621B.exe modified
            08:35:33AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
            08:36:14API Interceptor1x Sleep call for process: dhcpmon.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            84.38.133.182RFQ 10 UNIT.exeGet hashmaliciousBrowse
              185.140.53.253RFQ 10 UNIT.exeGet hashmaliciousBrowse
                NEWORDERrefno0992883jpg.exeGet hashmaliciousBrowse
                  CompanyLicense.exeGet hashmaliciousBrowse
                    16Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                      15Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                        58Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                          57Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                            15Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                              14Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse
                                57Product Specifications list -Order PCT1086586 1st Video.exeGet hashmaliciousBrowse
                                  56Order PCT1086586 - Project Commercial Conditions.exeGet hashmaliciousBrowse

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    dedicatedlambo9.ddns.netRFQ 10 UNIT.exeGet hashmaliciousBrowse
                                    • 84.38.133.182

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    DAVID_CRAIGGGRFQ 10 UNIT.exeGet hashmaliciousBrowse
                                    • 185.140.53.253
                                    A2CGhuioKe.exeGet hashmaliciousBrowse
                                    • 185.244.30.28
                                    0kEuVjiCbh.exeGet hashmaliciousBrowse
                                    • 185.244.30.28
                                    RFQ_Order WT013 - A11197322,pdf.exeGet hashmaliciousBrowse
                                    • 185.244.30.18
                                    ORDER.exeGet hashmaliciousBrowse
                                    • 185.140.53.132
                                    DHL_119040 receipt document,pdf.exeGet hashmaliciousBrowse
                                    • 185.244.30.18
                                    Img 673t5718737.exeGet hashmaliciousBrowse
                                    • 91.193.75.202
                                    Parts_Enquiry_450kr6CRT.vbsGet hashmaliciousBrowse
                                    • 185.140.53.169
                                    ltemsreceipt975432907.exeGet hashmaliciousBrowse
                                    • 185.244.30.19
                                    H194 #U5146#U57fa - Payment.exeGet hashmaliciousBrowse
                                    • 185.140.53.135
                                    Parts-Enquiry_OYU08W0VCWRDLPA.vbsGet hashmaliciousBrowse
                                    • 185.140.53.169
                                    OneDrive.exeGet hashmaliciousBrowse
                                    • 185.140.53.194
                                    CVhssiltQ9.exeGet hashmaliciousBrowse
                                    • 185.140.53.9
                                    rz89FRwKvB.exeGet hashmaliciousBrowse
                                    • 185.244.30.92
                                    doc030WA0004-55YH701-75IMG0012.exeGet hashmaliciousBrowse
                                    • 185.140.53.230
                                    Request For Quotation.xlsxGet hashmaliciousBrowse
                                    • 185.140.53.154
                                    CV CREDENTIALS.exeGet hashmaliciousBrowse
                                    • 185.140.53.8
                                    ARRIVAL NOTICEPDF.EXCL.exeGet hashmaliciousBrowse
                                    • 185.140.53.142
                                    WeASwOPOdNuVKbq.exeGet hashmaliciousBrowse
                                    • 185.140.53.8
                                    New Order# 11009947810.exeGet hashmaliciousBrowse
                                    • 185.140.53.216
                                    DATACLUB-NLRFQ 10 UNIT.exeGet hashmaliciousBrowse
                                    • 84.38.133.182
                                    FacebookSecurityUpdate.exeGet hashmaliciousBrowse
                                    • 84.38.133.101
                                    v1hBv6A71M.exeGet hashmaliciousBrowse
                                    • 84.38.133.24
                                    Standardequips_Quote.pptGet hashmaliciousBrowse
                                    • 185.29.11.15
                                    XsNgUDFxLw.exeGet hashmaliciousBrowse
                                    • 84.38.133.117
                                    18Order.exeGet hashmaliciousBrowse
                                    • 185.29.11.103
                                    56New Order oct 2018230090.exeGet hashmaliciousBrowse
                                    • 185.29.11.103

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):1102336
                                    Entropy (8bit):7.620117442134609
                                    Encrypted:false
                                    SSDEEP:24576:D0QSJpE4KrvDBbG5wOCYDr82fY+9s1q2MpSD3g:0+JG6BcICCN3
                                    MD5:F5D3B895F4109E09F8918FC52147D154
                                    SHA1:E4FE29023BD9AF1916D7C12197949DDAED424E8B
                                    SHA-256:9713A28E0645CC77089DFD921118DB8827DE0A8B7E8196D653DA2002646BD3CF
                                    SHA-512:3F3A765C18E5D2C5E39E815476B533BEFD98ADEDE73C4976A12F8B9E3BD8F5BB3B8EA995E48B4B9DEC364B82BC8C0F80E0E783C5E6DA29C293A1FDA8AEEB95C1
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 17%
                                    Reputation:low
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................P.............B.... ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text...H.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................$.......H...........4|..........$....L...........................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*&..(3....*...0..<........~.....(4.....,!r...p.....(5...o6...s7............~.....
                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: [ZoneTransfer]....ZoneId=0
                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER TSA-A090621B.exe.log
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1314
                                    Entropy (8bit):5.350128552078965
                                    Encrypted:false
                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1314
                                    Entropy (8bit):5.350128552078965
                                    Encrypted:false
                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1624
                                    Entropy (8bit):7.024371743172393
                                    Encrypted:false
                                    SSDEEP:48:Ik/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrwfk/lCrw8:flC0IlC0IlC0IlC0IlC0IlC0IlC08
                                    MD5:0D79388CEC6619D612C2088173BB6741
                                    SHA1:8A312E3198009C545D0CF3254572189D29A03EA7
                                    SHA-256:D7D423B23D932E306F3CCB2F7A984B7036A042C007A43FD655C6B57B960BB8DF
                                    SHA-512:53BB3E9263DFD746E7E8159466E220E6EC9D81E9D3F0E1D191E09CD511B7EB93B0BA65D13CE0C97C652ECD0F69BB991E6B1840F961BC65003C4DD7AA93EEDA13
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8
                                    Entropy (8bit):3.0
                                    Encrypted:false
                                    SSDEEP:3:7ht:tt
                                    MD5:A7550BD6998D4B201226569FAD19FEE2
                                    SHA1:9B40BDC466BCB9BD006D37E5704C428A8EA6AC7D
                                    SHA-256:C484DF23E31180678D28C7C68F6DAA4F721849C74613C19EEB9920CDBF544466
                                    SHA-512:8622EDACFC4BD5C90BD976BB008FBC142E6B6CE6326B5C27BA8D86E22527F6F055D91DC1BD67E094A3EF9951D7920B0DE600F0210A50342D1ED3D5F01288EA9C
                                    Malicious:true
                                    Preview: .s...K.H
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):40
                                    Entropy (8bit):5.153055907333276
                                    Encrypted:false
                                    SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                    MD5:4E5E92E2369688041CC82EF9650EDED2
                                    SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                    SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                    SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                    Malicious:false
                                    Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                    Process:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):327432
                                    Entropy (8bit):7.99938831605763
                                    Encrypted:true
                                    SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                    MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                    SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                    SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                    SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                    Malicious:false
                                    Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.620117442134609
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:ORDER TSA-A090621B.exe
                                    File size:1102336
                                    MD5:f5d3b895f4109e09f8918fc52147d154
                                    SHA1:e4fe29023bd9af1916d7c12197949ddaed424e8b
                                    SHA256:9713a28e0645cc77089dfd921118db8827de0a8b7e8196d653da2002646bd3cf
                                    SHA512:3f3a765c18e5d2c5e39e815476b533befd98adede73c4976a12f8b9e3bd8f5bb3b8ea995e48b4b9dec364b82bc8c0f80e0e783c5e6da29c293a1fda8aeeb95c1
                                    SSDEEP:24576:D0QSJpE4KrvDBbG5wOCYDr82fY+9s1q2MpSD3g:0+JG6BcICCN3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P.............B.... ........@.. .......................@............@................................

                                    File Icon

                                    Icon Hash:00828e8e8686b000

                                    Static PE Info

                                    General

                                    Entrypoint:0x50e942
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0xD09DABD0 [Thu Nov 28 04:34:24 2080 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                    Entrypoint Preview

                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x10e8f00x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1100000x3a8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x10e8d40x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x10c9480x10ca00False0.77032467863data7.62512581288IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0x1100000x3a80x400False0.3740234375data2.91950610469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1120000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0x1100580x34cdata

                                    Imports

                                    DLLImport
                                    mscoree.dll_CorExeMain

                                    Version Infos

                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright 2019
                                    Assembly Version1.0.0.0
                                    InternalNameConstructorIn.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarks
                                    Comments
                                    ProductNameControlVehicular
                                    ProductVersion1.0.0.0
                                    FileDescriptionControlVehicular
                                    OriginalFilenameConstructorIn.exe

                                    Network Behavior

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 20, 2021 08:35:34.780050993 CEST497251604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:34.832556009 CEST160449725185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:35.437164068 CEST497251604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:35.493923903 CEST160449725185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:36.137645960 CEST497251604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:36.190048933 CEST160449725185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:40.514049053 CEST497281604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:40.567167044 CEST160449728185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:41.075562000 CEST497281604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:41.128336906 CEST160449728185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:41.638111115 CEST497281604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:41.690731049 CEST160449728185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:45.704961061 CEST497291604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:45.757949114 CEST160449729185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:46.263520002 CEST497291604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:46.316087008 CEST160449729185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:46.826009035 CEST497291604192.168.2.3185.140.53.253
                                    Jul 20, 2021 08:35:46.878325939 CEST160449729185.140.53.253192.168.2.3
                                    Jul 20, 2021 08:35:51.594572067 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.643904924 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:51.644035101 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.744390965 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.808680058 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:51.825025082 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.874622107 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:51.898194075 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:51.968378067 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014534950 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014588118 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014627934 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014659882 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.014666080 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.014740944 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.063858032 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.063915968 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.063956022 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.063993931 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064040899 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064059019 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.064074993 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064105034 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064133883 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.064166069 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.064202070 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.113691092 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113795996 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113843918 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113882065 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113919973 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113931894 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.113956928 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.113957882 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.113996029 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114016056 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114032984 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114079952 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114123106 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114135027 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114161968 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114164114 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114198923 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114237070 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114265919 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114295959 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114304066 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.114331961 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.114341021 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.115328074 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164592981 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164619923 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164653063 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164669037 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164690971 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164748907 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164767027 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164793968 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164817095 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164850950 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.164866924 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164895058 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.164968967 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165030956 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165081024 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165107012 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165136099 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165177107 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165203094 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165215015 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165255070 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165292978 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165313005 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165338039 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165342093 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165385008 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165422916 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165462017 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165465117 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165501118 CEST16044973284.38.133.182192.168.2.3
                                    Jul 20, 2021 08:35:52.165535927 CEST497321604192.168.2.384.38.133.182
                                    Jul 20, 2021 08:35:52.165539026 CEST16044973284.38.133.182192.168.2.3

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Jul 20, 2021 08:34:53.545691967 CEST6015253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:53.603352070 CEST53601528.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:54.573818922 CEST5754453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:54.640820980 CEST53575448.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:55.424590111 CEST5598453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:55.476885080 CEST53559848.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:56.579981089 CEST6418553192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:56.641343117 CEST53641858.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:57.780179024 CEST6511053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:57.829746962 CEST53651108.8.8.8192.168.2.3
                                    Jul 20, 2021 08:34:59.329930067 CEST5836153192.168.2.38.8.8.8
                                    Jul 20, 2021 08:34:59.382251978 CEST53583618.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:03.831197023 CEST6349253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:03.888165951 CEST53634928.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:23.516596079 CEST6083153192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:23.590126038 CEST53608318.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:24.242350101 CEST6010053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:24.300898075 CEST53601008.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:25.059842110 CEST5319553192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:25.112210989 CEST53531958.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:26.223959923 CEST5014153192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:26.280510902 CEST53501418.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:27.387494087 CEST5302353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:27.447293997 CEST53530238.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:28.302690029 CEST4956353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:28.364147902 CEST53495638.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:29.511519909 CEST5135253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:29.574074030 CEST53513528.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:31.369796038 CEST5934953192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:31.419261932 CEST53593498.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:32.711429119 CEST5708453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:32.768209934 CEST53570848.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:36.647136927 CEST5882353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:36.704849958 CEST53588238.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:37.812659025 CEST5756853192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:37.872311115 CEST53575688.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:46.183872938 CEST5054053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:46.253024101 CEST53505408.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:46.374830008 CEST5436653192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:46.433748007 CEST53543668.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:51.531042099 CEST5303453192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:51.592425108 CEST53530348.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:58.652704954 CEST5776253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:58.726581097 CEST53577628.8.8.8192.168.2.3
                                    Jul 20, 2021 08:35:59.546921968 CEST5543553192.168.2.38.8.8.8
                                    Jul 20, 2021 08:35:59.605354071 CEST53554358.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:03.621918917 CEST5071353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:03.683888912 CEST53507138.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:04.778085947 CEST5613253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:04.838644981 CEST53561328.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:11.737570047 CEST5898753192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:11.796391010 CEST53589878.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:19.305597067 CEST5657953192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:19.363178015 CEST53565798.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:25.514846087 CEST6063353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:25.573158979 CEST53606338.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:32.455975056 CEST6129253192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:32.516514063 CEST53612928.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:34.155363083 CEST6361953192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:34.215497017 CEST53636198.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:36.368540049 CEST6493853192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:36.425828934 CEST53649388.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:38.505142927 CEST6194653192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:38.567308903 CEST53619468.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:45.567162037 CEST6491053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:45.625282049 CEST53649108.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:51.571012974 CEST5212353192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:51.632529020 CEST53521238.8.8.8192.168.2.3
                                    Jul 20, 2021 08:36:57.688997030 CEST5613053192.168.2.38.8.8.8
                                    Jul 20, 2021 08:36:57.746087074 CEST53561308.8.8.8192.168.2.3
                                    Jul 20, 2021 08:37:04.547127008 CEST5633853192.168.2.38.8.8.8
                                    Jul 20, 2021 08:37:04.605415106 CEST53563388.8.8.8192.168.2.3

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Jul 20, 2021 08:35:51.531042099 CEST192.168.2.38.8.8.80x461bStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:35:59.546921968 CEST192.168.2.38.8.8.80xa3c3Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:04.778085947 CEST192.168.2.38.8.8.80xdff9Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:11.737570047 CEST192.168.2.38.8.8.80x88a6Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:19.305597067 CEST192.168.2.38.8.8.80x711bStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:25.514846087 CEST192.168.2.38.8.8.80x676fStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:32.455975056 CEST192.168.2.38.8.8.80x237bStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:38.505142927 CEST192.168.2.38.8.8.80xcdcfStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:45.567162037 CEST192.168.2.38.8.8.80xa1e0Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:51.571012974 CEST192.168.2.38.8.8.80xf34cStandard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:57.688997030 CEST192.168.2.38.8.8.80xd032Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)
                                    Jul 20, 2021 08:37:04.547127008 CEST192.168.2.38.8.8.80xb17Standard query (0)dedicatedlambo9.ddns.netA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Jul 20, 2021 08:35:51.592425108 CEST8.8.8.8192.168.2.30x461bNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:35:59.605354071 CEST8.8.8.8192.168.2.30xa3c3No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:04.838644981 CEST8.8.8.8192.168.2.30xdff9No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:11.796391010 CEST8.8.8.8192.168.2.30x88a6No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:19.363178015 CEST8.8.8.8192.168.2.30x711bNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:25.573158979 CEST8.8.8.8192.168.2.30x676fNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:32.516514063 CEST8.8.8.8192.168.2.30x237bNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:38.567308903 CEST8.8.8.8192.168.2.30xcdcfNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:45.625282049 CEST8.8.8.8192.168.2.30xa1e0No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:51.632529020 CEST8.8.8.8192.168.2.30xf34cNo error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:36:57.746087074 CEST8.8.8.8192.168.2.30xd032No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)
                                    Jul 20, 2021 08:37:04.605415106 CEST8.8.8.8192.168.2.30xb17No error (0)dedicatedlambo9.ddns.net84.38.133.182A (IP address)IN (0x0001)

                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:08:34:59
                                    Start date:20/07/2021
                                    Path:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\ORDER TSA-A090621B.exe'
                                    Imagebase:0xaa0000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    General

                                    Start time:08:35:28
                                    Start date:20/07/2021
                                    Path:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Imagebase:0x60000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    General

                                    Start time:08:35:29
                                    Start date:20/07/2021
                                    Path:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\ORDER TSA-A090621B.exe
                                    Imagebase:0xfb0000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499314536.0000000006B90000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500192513.0000000007710000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500525648.0000000007C60000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.495158734.00000000045F7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499144017.0000000006AF0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.495469070.000000000478F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499169439.0000000006B00000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500549861.0000000007C70000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.498290659.0000000005BB0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.495497287.00000000047A6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499236783.0000000006B40000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499201133.0000000006B20000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.489488042.00000000034CA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500174587.0000000007700000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.498755747.00000000065E0000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499185267.0000000006B10000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.482529229.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.500371325.00000000079D0000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.494838294.00000000044A5000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.489008599.0000000003451000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, Author: Florian Roth
                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000006.00000002.499269257.0000000006B60000.00000004.00000001.sdmp, Author: Florian Roth
                                    Reputation:low

                                    General

                                    Start time:08:35:42
                                    Start date:20/07/2021
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                    Imagebase:0xcf0000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Antivirus matches:
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 17%, ReversingLabs
                                    Reputation:low

                                    General

                                    Start time:08:36:15
                                    Start date:20/07/2021
                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                    Imagebase:0x620000
                                    File size:1102336 bytes
                                    MD5 hash:F5D3B895F4109E09F8918FC52147D154
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.396003210.00000000039E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.394406077.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.395871359.00000000029E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                    Reputation:low

                                    Disassembly

                                    Code Analysis

                                    Reset < >