Loading ...

Play interactive tourEdit tour

Windows Analysis Report Order List.exe

Overview

General Information

Sample Name:Order List.exe
Analysis ID:457798
MD5:e2893188b7e7d6f19581a7981c2a0a75
SHA1:6a7a3d1ecb2175b53fb98974220f15ec6a1545cf
SHA256:09b6f40cf52bde38b03cbf49a02e40370914aacfe727cda9d6d9002cce5debeb
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • Order List.exe (PID: 5776 cmdline: 'C:\Users\user\Desktop\Order List.exe' MD5: E2893188B7E7D6F19581A7981C2A0A75)
    • schtasks.exe (PID: 1848 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AylDGlu' /XML 'C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 5564 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
    • MSBuild.exe (PID: 4988 cmdline: {path} MD5: D621FD77BD585874F9686D3A76462EF1)
      • schtasks.exe (PID: 3100 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp6DFE.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5512 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp71A9.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 1716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 488 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0 MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 1012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5276 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6080 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: D621FD77BD585874F9686D3A76462EF1)
    • conhost.exe (PID: 3980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "1b30e380-3e9d-40b0-8d35-d1fb4c64", "Group": "gintx$$", "Domain1": "79.134.225.115", "Domain2": "gintex.ddns.net", "Port": 21180, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x350b:$x1: NanoCore.ClientPluginHost
  • 0x3525:$x2: IClientNetworkHost
00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x350b:$x2: NanoCore.ClientPluginHost
  • 0x52b6:$s4: PipeCreated
  • 0x34f8:$s5: IClientLoggingHost
00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x16e3:$x1: NanoCore.ClientPluginHost
  • 0x171c:$x2: IClientNetworkHost
00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x16e3:$x2: NanoCore.ClientPluginHost
  • 0x1800:$s4: PipeCreated
  • 0x16fd:$s5: IClientLoggingHost
00000012.00000002.500969666.0000000003FD6000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
  • 0x30da:$a: NanoCore
  • 0x313b:$a: NanoCore
  • 0x317e:$a: NanoCore
  • 0x31be:$a: NanoCore
  • 0x33fa:$a: NanoCore
  • 0x349a:$a: NanoCore
  • 0x3c72:$a: NanoCore
  • 0x4265:$a: NanoCore
  • 0x43b6:$a: NanoCore
  • 0x5210:$a: NanoCore
  • 0x5477:$a: NanoCore
  • 0x548c:$a: NanoCore
  • 0x54ab:$a: NanoCore
  • 0xe3ae:$a: NanoCore
  • 0xe3d7:$a: NanoCore
  • 0x3150:$b: ClientPlugin
  • 0x3403:$b: ClientPlugin
  • 0x34a3:$b: ClientPlugin
  • 0xe1ce:$b: ClientPlugin
  • 0xe1e2:$b: ClientPlugin
  • 0xe212:$b: ClientPlugin
Click to see the 43 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
18.2.MSBuild.exe.6df0000.29.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3d99:$x1: NanoCore.ClientPluginHost
  • 0x3db3:$x2: IClientNetworkHost
18.2.MSBuild.exe.6df0000.29.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x3d99:$x2: NanoCore.ClientPluginHost
  • 0x4dce:$s4: PipeCreated
  • 0x3d86:$s5: IClientLoggingHost
18.2.MSBuild.exe.6da0000.24.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x5b0b:$x1: NanoCore.ClientPluginHost
  • 0x5b44:$x2: IClientNetworkHost
18.2.MSBuild.exe.6da0000.24.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0x5b0b:$x2: NanoCore.ClientPluginHost
  • 0x5c0f:$s4: PipeCreated
  • 0x5b25:$s5: IClientLoggingHost
18.2.MSBuild.exe.3fde83e.11.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3d99:$x1: NanoCore.ClientPluginHost
  • 0x3db3:$x2: IClientNetworkHost
Click to see the 116 entries

Sigma Overview

AV Detection:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 4988, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

E-Banking Fraud:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 4988, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Stealing of Sensitive Information:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 4988, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Remote Access Functionality:

barindex
Sigma detected: NanoCoreShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 4988, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Found malware configurationShow sources
Source: 00000012.00000002.500557956.0000000003D5E000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "1b30e380-3e9d-40b0-8d35-d1fb4c64", "Group": "gintx$$", "Domain1": "79.134.225.115", "Domain2": "gintex.ddns.net", "Port": 21180, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\AylDGlu.exeReversingLabs: Detection: 32%
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.500557956.0000000003D5E000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTR
Source: 18.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
Source: 0.2.Order List.exe.e50000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
Source: 18.2.MSBuild.exe.6240000.18.unpackAvira: Label: TR/NanoCore.fadte

Compliance:

barindex
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\Order List.exeUnpacked PE file: 0.2.Order List.exe.e50000.0.unpack
Source: Order List.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Order List.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: dhcpmon.exe

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49720 -> 79.134.225.115:21180
C2 URLs / IPs found in malware configurationShow sources
Source: Malware configuration extractorURLs: gintex.ddns.net
Source: Malware configuration extractorURLs: 79.134.225.115
Source: global trafficTCP traffic: 192.168.2.5:49720 -> 79.134.225.115:21180
Source: Joe Sandbox ViewIP Address: 79.134.225.115 79.134.225.115
Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
Source: unknownTCP traffic detected without corresponding DNS query: 8.253.95.249
Source: unknownTCP traffic detected without corresponding DNS query: 8.253.95.249
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
Source: unknownTCP traffic detected without corresponding DNS query: 23.211.5.146
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 104.18.25.243
Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.115
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Order List.exe, 00000000.00000003.231082460.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.htmlBSZeai
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
Source: Order List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
Source: Order List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
Source: Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
Source: Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
Source: Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comFc_
Source: Order List.exe, 00000000.00000003.233697595.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comI.TTF
Source: Order List.exe, 00000000.00000003.232385317.00000000065F4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
Source: Order List.exe, 00000000.00000003.233466801.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comc_
Source: Order List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comce
Source: Order List.exe, 00000000.00000003.233549043.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcom
Source: Order List.exe, 00000000.00000003.233549043.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
Source: Order List.exe, 00000000.00000003.232385317.00000000065F4000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd.F
Source: Order List.exe, 00000000.00000003.232906283.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
Source: Order List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comf
Source: Order List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comituF
Source: Order List.exe, 00000000.00000003.236577292.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comm
Source: Order List.exe, 00000000.00000003.236188400.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.commito
Source: Order List.exe, 00000000.00000003.236577292.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comoitu
Source: Order List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comrsiv
Source: Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtuF
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
Source: Order List.exe, 00000000.00000003.228566860.00000000065D2000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.229044381.00000000065D0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
Source: Order List.exe, 00000000.00000003.229044381.00000000065D0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn-
Source: Order List.exe, 00000000.00000003.228530300.00000000065D5000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: Order List.exe, 00000000.00000003.229044381.00000000065D0000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnU
Source: Order List.exe, 00000000.00000003.234322373.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: Order List.exe, 00000000.00000003.234322373.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/F_var
Source: Order List.exe, 00000000.00000003.234322373.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/W
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.230341333.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-_
Source: Order List.exe, 00000000.00000003.230864466.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/://w
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/F_var
Source: Order List.exe, 00000000.00000003.229784102.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Norm-_
Source: Order List.exe, 00000000.00000003.230341333.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/R
Source: Order List.exe, 00000000.00000003.230019994.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/j_
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/al
Source: Order List.exe, 00000000.00000003.229661302.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/c_
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/fr-f
Source: Order List.exe, 00000000.00000003.229784102.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/j_
Source: Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.231136881.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: Order List.exe, 00000000.00000003.231136881.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/c_
Source: Order List.exe, 00000000.00000003.229661302.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/u_
Source: Order List.exe, 00000000.00000003.229661302.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ww.mQ_aar
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
Source: Order List.exe, 00000000.00000003.232095762.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
Source: Order List.exe, 00000000.00000003.232030285.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deF
Source: Order List.exe, 00000000.00000003.233697595.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deFr
Source: Order List.exe, 00000000.00000003.233697595.00000000065F0000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.depS
Source: Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
Source: Order List.exe, Order List.exe, 00000000.00000002.317154586.0000000000F01000.00000002.00020000.sdmpString found in binary or memory: https://github.com/seungyup26/minulazer
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49688
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49675
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49680
Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49681 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443

E-Banking Fraud:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.500557956.0000000003D5E000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTR

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 18.2.MSBuild.exe.6df0000.29.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6da0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3fde83e.11.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3d09930.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6de0000.28.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6d90000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.40625ae.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d92a08.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6de0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d92a08.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d92a08.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.6e20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e60000.34.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e10000.30.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.405417e.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d442cc.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3fde83e.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6da0000.24.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.65b0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d442cc.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6db0000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e10000.30.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2da7044.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2da7044.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.6d50000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6dd0000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3d09930.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e2e8a4.33.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.40625ae.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6dd0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6df0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6db0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6dc0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2daca7c.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2daca7c.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.5510000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.405417e.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e20000.32.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.65b0000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.404b34f.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6d50000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.6e24c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2daca7c.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d34708.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.2d34708.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.3d181d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.3d0e5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 18.2.MSBuild.exe.404b34f.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 18.2.MSBuild.exe.404b34f.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.500969666.0000000003FD6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.504550437.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504188143.00000000065B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504614903.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504566226.0000000006DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.503067769.0000000005510000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504637714.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504719426.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.504589888.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.496725291.0000000002D80000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.500995543.0000000003FEF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Source: 00000012.00000002.504402260.0000000006D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504820469.0000000006E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: 00000012.00000002.504524423.0000000006DA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
Source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
Initial sample is a PE file and has a suspicious nameShow sources
Source: initial sampleStatic PE information: Filename: Order List.exe
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D01A4 NtQueryInformationProcess,
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D34A1 NtQueryInformationProcess,
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D2E08
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D37C8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D04D1
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D37B8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D177A0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D14648
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D173D0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D123D8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D18BF8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D14B08
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D142E0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D1B241
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D13218
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D17791
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11FB0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11FA0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D136D0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D18E50
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D18E42
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11678
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11668
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D15638
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D155E8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11D40
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11D31
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D13D25
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D173C0
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D123C8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D17B80
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D17B70
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D10AD1
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D10AD8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D1DAA8
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D12219
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D13209
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D12228
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D11989
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D18838
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_06E72F70
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_06E72358
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_06E642EB
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_06E646D3
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_06E73850
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_02C8E480
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_02C8E471
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 18_2_02C8BBD4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 23_2_02E24A20
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 23_2_02E218C0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 23_2_02E22148
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 23_2_02E25D08
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 23_2_02E22133
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_02D718C0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_02D75858
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_02D74580
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_02D72148
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_02D72138
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_031C2370
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_031C51F9
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_031C18C0
Source: Order List.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: AylDGlu.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.18.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.18.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: dhcpmon.exe.18.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Order List.exeBinary or memory string: OriginalFilename vs Order List.exe
Source: Order List.exe, 00000000.00000002.317280023.0000000000F6D000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameecofAet.exe. vs Order List.exe
Source: Order List.exe, 00000000.00000002.328357531.00000000080E0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Order List.exe
Source: Order List.exe, 00000000.00000002.328357531.00000000080E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Order List.exe
Source: Order List.exe, 00000000.00000002.326789430.0000000007C30000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Order List.exe
Source: Order List.exe, 00000000.00000002.321431263.00000000044C8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Order List.exe
Source: Order List.exe, 00000000.00000002.327815319.0000000007E90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Order List.exe
Source: Order List.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: 18.2.MSBuild.exe.6df0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6df0000.29.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6da0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6da0000.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3fde83e.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3fde83e.11.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3d09930.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d09930.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e60000.34.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6de0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6de0000.28.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6d90000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6d90000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.40625ae.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.40625ae.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2d92a08.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2d92a08.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6de0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6de0000.28.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2d92a08.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2d92a08.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.6e20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e20000.32.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e60000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e60000.34.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e10000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e10000.30.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.405417e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.405417e.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2d442cc.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2d442cc.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3fde83e.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3fde83e.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6da0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6da0000.24.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.65b0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.65b0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2d442cc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2d442cc.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6db0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6db0000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e10000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e10000.30.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2da7044.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2da7044.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.6d50000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6d50000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6dd0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6dd0000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3d09930.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d09930.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e2e8a4.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e2e8a4.33.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.40625ae.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.40625ae.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6dd0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6dd0000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6df0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6df0000.29.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6db0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6db0000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6dc0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6dc0000.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2daca7c.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2daca7c.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.5510000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.5510000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.405417e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.405417e.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e20000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e20000.32.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.65b0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.65b0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.404b34f.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.404b34f.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6d50000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6d50000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.6e24c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.6e24c9f.31.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2daca7c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2daca7c.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2d34708.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.2d34708.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.2d34708.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.3d181d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d181d4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.3d0e5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.3d0e5cf.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 18.2.MSBuild.exe.404b34f.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 18.2.MSBuild.exe.404b34f.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 18.2.MSBuild.exe.404b34f.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.500969666.0000000003FD6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.504550437.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504550437.0000000006DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504188143.00000000065B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504188143.00000000065B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504614903.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504614903.0000000006DE0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504566226.0000000006DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504566226.0000000006DC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.503067769.0000000005510000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.503067769.0000000005510000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504637714.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504637714.0000000006DF0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504719426.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504719426.0000000006E20000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.504589888.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504589888.0000000006DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.496725291.0000000002D80000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.500995543.0000000003FEF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: 00000012.00000002.504402260.0000000006D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504402260.0000000006D50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504820469.0000000006E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504820469.0000000006E60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 00000012.00000002.504524423.0000000006DA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: 00000012.00000002.504524423.0000000006DA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
Source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
Source: Order List.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: AylDGlu.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: dhcpmon.exe.18.dr, Microsoft.Build/Shared/TaskLoader.csTask registration methods: 'CreateTask'
Source: dhcpmon.exe.18.dr, Microsoft.Build/CommandLine/OutOfProcTaskHostNode.csTask registration methods: 'RegisterTaskObject', 'UnregisterPacketHandler', 'RegisterPacketHandler', 'UnregisterTaskObject', 'GetRegisteredTaskObject'
Source: dhcpmon.exe.18.dr, Microsoft.Build/BackEnd/TaskParameter.csTask registration methods: 'CreateNewTaskItemFrom'
Source: dhcpmon.exe.18.dr, Microsoft.Build/Shared/RegisteredTaskObjectCacheBase.csTask registration methods: '.cctor', 'GetLazyCollectionForLifetime', 'RegisterTaskObject', 'DisposeObjects', 'IsCollectionEmptyOrUncreated', '.ctor', 'UnregisterTaskObject', 'DisposeCacheObjects', 'GetRegisteredTaskObject', 'GetCollectionForLifetime'
Source: 25.0.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 25.0.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
Source: 25.0.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
Source: 25.0.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 25.0.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: dhcpmon.exe.18.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: dhcpmon.exe.18.dr, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 25.2.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 25.2.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/Internal/CommunicationsUtilities.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: dhcpmon.exe.18.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: dhcpmon.exe.18.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
Source: dhcpmon.exe.18.dr, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
Source: 25.2.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 25.2.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent(System.Boolean)
Source: 25.2.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/BackEnd/NodeEndpointOutOfProcBase.csSecurity API names: System.Void System.IO.Pipes.PipeSecurity::AddAccessRule(System.IO.Pipes.PipeAccessRule)
Source: dhcpmon.exeBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
Source: dhcpmon.exeBinary or memory string: *.sln
Source: classification engineClassification label: mal100.troj.evad.winEXE@20/17@0/1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
Source: C:\Users\user\Desktop\Order List.exeFile created: C:\Users\user\AppData\Roaming\AylDGlu.exeJump to behavior
Source: C:\Users\user\Desktop\Order List.exeMutant created: \Sessions\1\BaseNamedObjects\kOZZvLwy
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_01
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{1b30e380-3e9d-40b0-8d35-d1fb4c649239}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1716:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4472:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1012:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4692:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3980:120:WilError_01
Source: C:\Users\user\Desktop\Order List.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5BCE.tmpJump to behavior
Source: Order List.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Order List.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
Source: C:\Users\user\Desktop\Order List.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Order List.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\Order List.exeFile read: C:\Users\user\Desktop\Order List.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Order List.exe 'C:\Users\user\Desktop\Order List.exe'
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AylDGlu' /XML 'C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp'
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp6DFE.tmp'
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp71A9.tmp'
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AylDGlu' /XML 'C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp'
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp6DFE.tmp'
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp71A9.tmp'
Source: C:\Users\user\Desktop\Order List.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\Order List.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
Source: Order List.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Order List.exeStatic file information: File size 1167872 > 1048576
Source: Order List.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: dhcpmon.exe

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\Users\user\Desktop\Order List.exeUnpacked PE file: 0.2.Order List.exe.e50000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\Users\user\Desktop\Order List.exeUnpacked PE file: 0.2.Order List.exe.e50000.0.unpack
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_00E55FFC push 00000057h; iretd
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_00E55241 pushfd ; iretd
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_018D7CCC pushfd ; ret
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D1A0D8 push 0000006Dh; retf
Source: C:\Users\user\Desktop\Order List.exeCode function: 0_2_07D1A01D push edx; iretd
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 25_2_02D75578 push FFFFFF8Bh; iretd
Source: initial sampleStatic PE information: section name: .text entropy: 7.42920521019
Source: initial sampleStatic PE information: section name: .text entropy: 7.42920521019
Source: C:\Users\user\Desktop\Order List.exeFile created: C:\Users\user\AppData\Roaming\AylDGlu.exeJump to dropped file
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AylDGlu' /XML 'C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp'
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\Order List.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3Show sources
Source: Yara matchFile source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTR
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
Source: C:\Users\user\Desktop\Order List.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 4328
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 4625
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 445
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 582
Source: C:\Users\user\Desktop\Order List.exe TID: 5720Thread sleep time: -59000s >= -30000s
Source: C:\Users\user\Desktop\Order List.exe TID: 5480Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1556Thread sleep time: -11068046444225724s >= -30000s
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5264Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5804Thread sleep time: -922337203685477s >= -30000s
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1000Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Order List.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
Source: Order List.exe, 00000000.00000002.336442627.000000000A002000.00000002.00000001.sdmpBinary or memory string: =Qemuy}
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: vmware
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: VMWARE
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
Source: Order List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: C:\Users\user\Desktop\Order List.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\Order List.exeProcess token adjusted: Debug
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\Order List.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion:

barindex
.NET source code references suspicious native API functionsShow sources
Source: dhcpmon.exe.18.dr, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 25.2.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Source: 25.0.dhcpmon.exe.a10000.0.unpack, Microsoft.Build/Shared/NativeMethodsShared.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32.dll'), ('OpenProcess', 'OpenProcess@KERNEL32.DLL'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\Order List.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5A
Writes to foreign memory regionsShow sources
Source: C:\Users\user\Desktop\Order List.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000
Source: C:\Users\user\Desktop\Order List.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000
Source: C:\Users\user\Desktop\Order List.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 420000
Source: C:\Users\user\Desktop\Order List.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 422000
Source: C:\Users\user\Desktop\Order List.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: B42008
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AylDGlu' /XML 'C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp'
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
Source: C:\Users\user\Desktop\Order List.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe {path}
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp6DFE.tmp'
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp71A9.tmp'
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Users\user\Desktop\Order List.exe VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Framework\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.dll VolumeInformation
Source: C:\Users\user\Desktop\Order List.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

Stealing of Sensitive Information:

barindex
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.500557956.0000000003D5E000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTR

Remote Access Functionality:

barindex
Detected Nanocore RatShow sources
Source: Order List.exe, 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
Source: MSBuild.exeString found in binary or memory: NanoCore.ClientPluginHost
Yara detected Nanocore RATShow sources
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d6dc19.10.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6244629.19.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.6240000.18.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 18.2.MSBuild.exe.3d695f0.9.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 0.2.Order List.exe.437abe8.3.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.500557956.0000000003D5E000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: Order List.exe PID: 5776, type: MEMORYSTR

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1Scheduled Task/Job11Process Injection211Masquerading2OS Credential DumpingSecurity Software Discovery211Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job11Boot or Logon Initialization ScriptsScheduled Task/Job11Disable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection211NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing23Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 457798 Sample: Order List.exe Startdate: 02/08/2021 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 12 other signatures 2->60 8 Order List.exe 6 2->8         started        12 MSBuild.exe 2 2->12         started        14 dhcpmon.exe 4 2->14         started        16 dhcpmon.exe 3 2->16         started        process3 file4 46 C:\Users\user\AppData\Roaming\AylDGlu.exe, PE32 8->46 dropped 48 C:\Users\user\AppData\Local\...\tmp5BCE.tmp, XML 8->48 dropped 62 Writes to foreign memory regions 8->62 64 Injects a PE file into a foreign processes 8->64 18 MSBuild.exe 1 15 8->18         started        22 schtasks.exe 1 8->22         started        24 MSBuild.exe 8->24         started        50 C:\Users\user\AppData\...\MSBuild.exe.log, ASCII 12->50 dropped 26 conhost.exe 12->26         started        28 conhost.exe 14->28         started        30 conhost.exe 16->30         started        signatures5 process6 dnsIp7 52 79.134.225.115, 21180, 49720 FINK-TELECOM-SERVICESCH Switzerland 18->52 42 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->42 dropped 44 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->44 dropped 32 schtasks.exe 1 18->32         started        34 schtasks.exe 1 18->34         started        36 conhost.exe 22->36         started        file8 process9 process10 38 conhost.exe 32->38         started        40 conhost.exe 34->40         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

SourceDetectionScannerLabelLink
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\AylDGlu.exe33%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
18.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
0.2.Order List.exe.e50000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
18.2.MSBuild.exe.6240000.18.unpack100%AviraTR/NanoCore.fadteDownload File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.jiyu-kobo.co.jp/://w0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/jp/u_0%Avira URL Cloudsafe
http://www.fontbureau.comI.TTF0%URL Reputationsafe
http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
http://www.ascendercorp.com/typedesigners.htmlBSZeai0%Avira URL Cloudsafe
http://www.founder.com.cn/cnU0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/fr-f0%Avira URL Cloudsafe
http://www.tiro.com0%URL Reputationsafe
http://www.urwpp.deFr0%Avira URL Cloudsafe
http://www.goodfont.co.kr0%URL Reputationsafe
http://www.urwpp.depS0%Avira URL Cloudsafe
http://www.sajatypeworks.com0%URL Reputationsafe
http://www.typography.netD0%URL Reputationsafe
http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
http://fontfabrik.com0%URL Reputationsafe
gintex.ddns.net0%Avira URL Cloudsafe
http://www.fontbureau.comcom0%URL Reputationsafe
http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
http://www.jiyu-kobo.co.jp/jp/c_0%Avira URL Cloudsafe
http://www.fontbureau.comrsiv0%URL Reputationsafe
http://www.sandoll.co.kr0%URL Reputationsafe
http://www.urwpp.deDPlease0%URL Reputationsafe
http://www.urwpp.de0%URL Reputationsafe
http://www.zhongyicts.com.cn0%URL Reputationsafe
http://www.fontbureau.comtuF0%Avira URL Cloudsafe
79.134.225.1150%Avira URL Cloudsafe
http://www.sakkal.com0%URL Reputationsafe
http://www.fontbureau.com.TTF0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/Y0/j_0%Avira URL Cloudsafe
http://www.galapagosdesign.com/0%URL Reputationsafe
http://www.fontbureau.comF0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/R0%URL Reputationsafe
http://www.fontbureau.comFc_0%Avira URL Cloudsafe
http://www.galapagosdesign.com/W0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/F_var0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/-_0%Avira URL Cloudsafe
http://www.urwpp.deF0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/c_0%Avira URL Cloudsafe
http://www.galapagosdesign.com/F_var0%Avira URL Cloudsafe
http://www.fontbureau.commito0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
http://www.fontbureau.coma0%URL Reputationsafe
http://www.fontbureau.comd0%URL Reputationsafe
http://www.fontbureau.come.com0%URL Reputationsafe
http://www.carterandcone.coml0%URL Reputationsafe
http://www.fontbureau.comd.F0%Avira URL Cloudsafe
http://www.founder.com.cn/cn/0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/Norm-_0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/ww.mQ_aar0%Avira URL Cloudsafe
http://www.fontbureau.comituF0%URL Reputationsafe
http://www.founder.com.cn/cn0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/al0%Avira URL Cloudsafe
http://www.fontbureau.comoitu0%URL Reputationsafe
http://www.founder.com.cn/cn-0%URL Reputationsafe
http://www.fontbureau.comm0%URL Reputationsafe
http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
http://www.fontbureau.comce0%Avira URL Cloudsafe
http://www.jiyu-kobo.co.jp/j_0%Avira URL Cloudsafe
http://www.fontbureau.comc_0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
gintex.ddns.nettrue
  • Avira URL Cloud: safe
unknown
79.134.225.115true
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.jiyu-kobo.co.jp/://wOrder List.exe, 00000000.00000003.230864466.00000000065F0000.00000004.00000001.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.fontbureau.com/designersGOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
    high
    http://www.jiyu-kobo.co.jp/jp/u_Order List.exe, 00000000.00000003.229661302.00000000065F0000.00000004.00000001.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.fontbureau.comI.TTFOrder List.exe, 00000000.00000003.233697595.00000000065F0000.00000004.00000001.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.fontbureau.com/designers/?Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
      high
      http://www.founder.com.cn/cn/bTheOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers?Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
        high
        http://www.ascendercorp.com/typedesigners.htmlBSZeaiOrder List.exe, 00000000.00000003.231082460.00000000065F0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.founder.com.cn/cnUOrder List.exe, 00000000.00000003.229044381.00000000065D0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.jiyu-kobo.co.jp/fr-fOrder List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.tiro.comOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designersOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          high
          http://www.urwpp.deFrOrder List.exe, 00000000.00000003.233697595.00000000065F0000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.goodfont.co.krOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.urwpp.depSOrder List.exe, 00000000.00000003.233697595.00000000065F0000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sajatypeworks.comOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.typography.netDOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.founder.com.cn/cn/cTheOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.galapagosdesign.com/staff/dennis.htmOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://fontfabrik.comOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.comcomOrder List.exe, 00000000.00000003.233549043.00000000065F0000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpfalse
            high
            http://www.galapagosdesign.com/DPleaseOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0Order List.exe, 00000000.00000003.230019994.00000000065F0000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/jp/c_Order List.exe, 00000000.00000003.231136881.00000000065F0000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.comrsivOrder List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fonts.comOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
              high
              http://www.sandoll.co.krOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deDPleaseOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.urwpp.deOrder List.exe, 00000000.00000003.232095762.00000000065F0000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.fontbureau.comtuFOrder List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOrder List.exe, 00000000.00000002.318116595.0000000003271000.00000004.00000001.sdmpfalse
                high
                http://www.sakkal.comOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com.TTFOrder List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.jiyu-kobo.co.jp/Y0/j_Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.comOrder List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpfalse
                    high
                    http://www.galapagosdesign.com/Order List.exe, 00000000.00000003.234322373.00000000065F0000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comFOrder List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/seungyup26/minulazerOrder List.exe, Order List.exe, 00000000.00000002.317154586.0000000000F01000.00000002.00020000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/ROrder List.exe, 00000000.00000003.230341333.00000000065F0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comFc_Order List.exe, 00000000.00000003.233049319.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.galapagosdesign.com/WOrder List.exe, 00000000.00000003.234322373.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/F_varOrder List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/-_Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.urwpp.deFOrder List.exe, 00000000.00000003.232030285.00000000065F0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/c_Order List.exe, 00000000.00000003.229661302.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/F_varOrder List.exe, 00000000.00000003.234322373.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.commitoOrder List.exe, 00000000.00000003.236188400.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.231136881.00000000065F0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comaOrder List.exe, 00000000.00000003.232385317.00000000065F4000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comdOrder List.exe, 00000000.00000003.233549043.00000000065F0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.come.comOrder List.exe, 00000000.00000003.232906283.00000000065F0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comd.FOrder List.exe, 00000000.00000003.232385317.00000000065F4000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.founder.com.cn/cn/Order List.exe, 00000000.00000003.228530300.00000000065D5000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/Norm-_Order List.exe, 00000000.00000003.229784102.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/ww.mQ_aarOrder List.exe, 00000000.00000003.229661302.00000000065F0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comituFOrder List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnOrder List.exe, 00000000.00000003.228566860.00000000065D2000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.229044381.00000000065D0000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlOrder List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.comfOrder List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpfalse
                            unknown
                            http://www.jiyu-kobo.co.jp/alOrder List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comoituOrder List.exe, 00000000.00000003.236577292.00000000065F0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn-Order List.exe, 00000000.00000003.229044381.00000000065D0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.commOrder List.exe, 00000000.00000003.236577292.00000000065F0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/Order List.exe, 00000000.00000003.230120834.00000000065F0000.00000004.00000001.sdmp, Order List.exe, 00000000.00000003.230341333.00000000065F0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8Order List.exe, 00000000.00000002.323589073.0000000006730000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comceOrder List.exe, 00000000.00000003.233495791.00000000065F0000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/j_Order List.exe, 00000000.00000003.229784102.00000000065F0000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comc_Order List.exe, 00000000.00000003.233466801.00000000065F0000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              low

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              79.134.225.115
                              unknownSwitzerland
                              6775FINK-TELECOM-SERVICESCHtrue

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:457798
                              Start date:02.08.2021
                              Start time:10:36:10
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 12m 36s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Order List.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:37
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@20/17@0/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 2.2% (good quality ratio 1.5%)
                              • Quality average: 36.1%
                              • Quality standard deviation: 32%
                              HCA Information:
                              • Successful, ratio: 93%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                              • TCP Packets have been reduced to 100
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 13.88.21.125, 104.42.151.234, 23.211.6.115, 23.211.4.86, 20.82.210.154, 40.112.88.60, 173.222.108.226, 173.222.108.210, 20.82.209.183, 80.67.82.235, 80.67.82.211, 23.203.69.124
                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, e15275.g.akamaiedge.net, arc.msn.com, e12564.dspb.akamaiedge.net, wildcard.weather.microsoft.com.edgekey.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, www.bing.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, tile-service.weather.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              10:37:45Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" s>$(Arg0)
                              10:37:48Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                              10:37:49AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              79.134.225.115fu.exeGet hashmaliciousBrowse
                                Purchase Order- #020521_pdf.exeGet hashmaliciousBrowse
                                  MT TT103-SWIFT_PDF.exeGet hashmaliciousBrowse
                                    Purchase Order-103667.pdf.exeGet hashmaliciousBrowse
                                      INQ-TR-04-21-RFQ.exeGet hashmaliciousBrowse
                                        PO#040221-INQ.exeGet hashmaliciousBrowse
                                          MrZNctz1uR.exeGet hashmaliciousBrowse
                                            168900#.exeGet hashmaliciousBrowse
                                              ORDER-PO29394934.exeGet hashmaliciousBrowse
                                                ORDER-PO020043.exeGet hashmaliciousBrowse
                                                  ORDER-9298PO3484.exeGet hashmaliciousBrowse
                                                    PO-ORDER20034993.exeGet hashmaliciousBrowse
                                                      ORDER-PURCHASE.exeGet hashmaliciousBrowse
                                                        1571088388.docGet hashmaliciousBrowse
                                                          RFQ Acknowledgement Form-decrypted.docGet hashmaliciousBrowse
                                                            RFQ NO. 1118295-decrypted.docGet hashmaliciousBrowse
                                                              p.msiGet hashmaliciousBrowse
                                                                mbq8XJ1u9C.rtfGet hashmaliciousBrowse
                                                                  mbq8XJ1u9C.rtfGet hashmaliciousBrowse

                                                                    Domains

                                                                    No context

                                                                    ASN

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    FINK-TELECOM-SERVICESCHRFQ 217563.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.116
                                                                    ORDER CONFIRMATION - 5309,pdf.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.76
                                                                    y7DZJshX9j.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.44
                                                                    SQycD6hL4Y.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.12
                                                                    TENDER INQUIRY REQUIREMENTS.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.95
                                                                    xwcTd7Kh9O.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.16
                                                                    RA1_20210729.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.98
                                                                    spworks.msiGet hashmaliciousBrowse
                                                                    • 79.134.225.73
                                                                    spworks.msiGet hashmaliciousBrowse
                                                                    • 79.134.225.73
                                                                    Request For Quotation.xlsxGet hashmaliciousBrowse
                                                                    • 79.134.225.16
                                                                    Faktura-835382925.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.73
                                                                    Order List.gz.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.100
                                                                    doc_18000476456499946534.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.44
                                                                    Bh8aCXgJx4.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.22
                                                                    Resumen detallado del proveedor de 1302640 de solicitud de presupuesto.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.8
                                                                    Investment1FZELtd.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.35
                                                                    KRooWcCysc.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.25
                                                                    Request price for partsDP35212202122000.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.44
                                                                    change of bank account.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.44
                                                                    partsDP35212202122000.exeGet hashmaliciousBrowse
                                                                    • 79.134.225.44

                                                                    JA3 Fingerprints

                                                                    No context

                                                                    Dropped Files

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeallcrhfJER.exeGet hashmaliciousBrowse
                                                                      quotation.exeGet hashmaliciousBrowse
                                                                        HSBC.exeGet hashmaliciousBrowse
                                                                          f026ae3a33ea7c54bcff959e9bdd2e60.exeGet hashmaliciousBrowse
                                                                            HUMVC_039873637892OIHGDHJZ.exeGet hashmaliciousBrowse
                                                                              HSBC Swift.exeGet hashmaliciousBrowse
                                                                                Purchase Order.exeGet hashmaliciousBrowse
                                                                                  Contract05072157393.exeGet hashmaliciousBrowse
                                                                                    19495C90691E8B6EEF5D55D50B9D76AE6CEB5629D6C08.exeGet hashmaliciousBrowse
                                                                                      PO# 6042089404900 & PAYMENT DETAILSpdf.exeGet hashmaliciousBrowse
                                                                                        SOA.exeGet hashmaliciousBrowse
                                                                                          Quotation Price - Double R Trading b.v.exeGet hashmaliciousBrowse
                                                                                            QTN TECHN 80654.exeGet hashmaliciousBrowse
                                                                                              Nizi International S.A. #New Order.exeGet hashmaliciousBrowse
                                                                                                DHL Shipment Documents.exeGet hashmaliciousBrowse
                                                                                                  27bd034c36964c455e2b2ad6b264561f.exeGet hashmaliciousBrowse
                                                                                                    quote #2063 almaco.exeGet hashmaliciousBrowse
                                                                                                      ConsoleSniffer v4.1 installer.exeGet hashmaliciousBrowse
                                                                                                        jtH33Uljkz.exeGet hashmaliciousBrowse
                                                                                                          quote #60123.exeGet hashmaliciousBrowse

                                                                                                            Created / dropped Files

                                                                                                            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):261728
                                                                                                            Entropy (8bit):6.1750840449797675
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3072:Mao0QHGUQWWimj9q/NLpj/WWqvAw2XpFU4rwOe4ubZSif02RFi/x2uv9FeP:boZTTWxxqVpqWVRXfr802biprVu
                                                                                                            MD5:D621FD77BD585874F9686D3A76462EF1
                                                                                                            SHA1:ABCAE05EE61EE6292003AABD8C80583FA49EDDA2
                                                                                                            SHA-256:2CA7CF7146FB8209CF3C6CECB1C5AA154C61E046DC07AFA05E8158F2C0DDE2F6
                                                                                                            SHA-512:2D85A81D708ECC8AF9A1273143C94DA84E632F1E595E22F54B867225105A1D0A44F918F0FAE6F1EB15ECF69D75B6F4616699776A16A2AA8B5282100FD15CA74C
                                                                                                            Malicious:false
                                                                                                            Antivirus:
                                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                            Joe Sandbox View:
                                                                                                            • Filename: allcrhfJER.exe, Detection: malicious, Browse
                                                                                                            • Filename: quotation.exe, Detection: malicious, Browse
                                                                                                            • Filename: HSBC.exe, Detection: malicious, Browse
                                                                                                            • Filename: f026ae3a33ea7c54bcff959e9bdd2e60.exe, Detection: malicious, Browse
                                                                                                            • Filename: HUMVC_039873637892OIHGDHJZ.exe, Detection: malicious, Browse
                                                                                                            • Filename: HSBC Swift.exe, Detection: malicious, Browse
                                                                                                            • Filename: Purchase Order.exe, Detection: malicious, Browse
                                                                                                            • Filename: Contract05072157393.exe, Detection: malicious, Browse
                                                                                                            • Filename: 19495C90691E8B6EEF5D55D50B9D76AE6CEB5629D6C08.exe, Detection: malicious, Browse
                                                                                                            • Filename: PO# 6042089404900 & PAYMENT DETAILSpdf.exe, Detection: malicious, Browse
                                                                                                            • Filename: SOA.exe, Detection: malicious, Browse
                                                                                                            • Filename: Quotation Price - Double R Trading b.v.exe, Detection: malicious, Browse
                                                                                                            • Filename: QTN TECHN 80654.exe, Detection: malicious, Browse
                                                                                                            • Filename: Nizi International S.A. #New Order.exe, Detection: malicious, Browse
                                                                                                            • Filename: DHL Shipment Documents.exe, Detection: malicious, Browse
                                                                                                            • Filename: 27bd034c36964c455e2b2ad6b264561f.exe, Detection: malicious, Browse
                                                                                                            • Filename: quote #2063 almaco.exe, Detection: malicious, Browse
                                                                                                            • Filename: ConsoleSniffer v4.1 installer.exe, Detection: malicious, Browse
                                                                                                            • Filename: jtH33Uljkz.exe, Detection: malicious, Browse
                                                                                                            • Filename: quote #60123.exe, Detection: malicious, Browse
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z.........."...0..|...B......n.... ........@.. ....................................`.....................................O........>..............`>.......................................................... ............... ..H............text....z... ...|.................. ..`.rsrc....>.......@...~..............@..@.reloc..............................@..B................P.......H.......8)...................|.........................................*.{.......*v.(=....r...p({...-..+..}....*....0..%........(....-..*....(z.....&..}.........*.*....................0..5........(....-..*.-.r+..ps>...z.....i(z.....&..}.........*.*............%......>....(?...(....*N..(@....oA...(....*:...(B...(....*:...(C...(....**....(....*....0..G........(....,..*..(....-...}.....*.r...p(x...&.(v.....}......&..}.........*.*..........7.......0..f........-.r7..ps>...z .....
                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:modified
                                                                                                            Size (bytes):841
                                                                                                            Entropy (8bit):5.356220854328477
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoIvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHwvEHxDqHj
                                                                                                            MD5:486580834B084C92AE1F3866166C9C34
                                                                                                            SHA1:C8EB7E1CEF55A6C9EB931487E9AA4A2098AACEDF
                                                                                                            SHA-256:65C5B1213E371D449E2A239557A5F250FEA1D3473A1B5C4C5FF7492085F663FB
                                                                                                            SHA-512:2C54B638A52AA87F47CAB50859EFF98F07DA02993A596686B5617BA99E73ABFCD104F0F33209E24AFB32E66B4B8A225D4DB2CC79631540C21E7E8C4573DFD457
                                                                                                            Malicious:true
                                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order List.exe.log
                                                                                                            Process:C:\Users\user\Desktop\Order List.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1216
                                                                                                            Entropy (8bit):5.355304211458859
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:ML9E4Ks29E4Kx1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MxHKX9HKx1qHiYHKhQnoPtHoxHhAHKzr
                                                                                                            MD5:B666A4404B132B2BF6C04FBF848EB948
                                                                                                            SHA1:D2EFB3D43F8B8806544D3A47F7DAEE8534981739
                                                                                                            SHA-256:7870616D981C8C0DE9A54E7383CD035470DB20CBF75ACDF729C32889D4B6ED96
                                                                                                            SHA-512:00E955EE9F14CEAE07E571A8EF2E103200CF421BAE83A66ED9F9E1AA6A9F449B653EDF1BFDB662A364D58ECF9B5FE4BB69D590DB2653F2F46A09F4D47719A862
                                                                                                            Malicious:false
                                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:modified
                                                                                                            Size (bytes):1037
                                                                                                            Entropy (8bit):5.371216502395632
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7KvEE4xDqE4j:MxHKXwYHKhQnoPtHoxHhAHKzvKvEHxD0
                                                                                                            MD5:C7F28B87C2CAD111D929CB9A0FF822F8
                                                                                                            SHA1:C2CF9E7A3F6EFD9000FE76EBE54E4E9AE5754267
                                                                                                            SHA-256:D1B02C20EACF464229AB063FA947A525E2ED7772259A8F70C7205DC13599EAE6
                                                                                                            SHA-512:E0F35874E02AB672CFF0553A0DA0864DAB14C05733D06395E4D0C9CDFC6F445E940310F8D01E3E1B28895F636DFBC1F510E103D1C46818400BA4E7371D8F254D
                                                                                                            Malicious:false
                                                                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.Build.Framework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build, Version=4.0.0.0, Culture=neutral,
                                                                                                            C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp
                                                                                                            Process:C:\Users\user\Desktop\Order List.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1644
                                                                                                            Entropy (8bit):5.165156184375511
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+SEqC/a7hTlNMFpH/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB9tn:cbhC7ZlNQF/rydbz9I3YODOLNdq3V
                                                                                                            MD5:3813C1B0AF635F5B444709655B411776
                                                                                                            SHA1:E53CAFA0ED3C230E932B3492E6FA98305C565A14
                                                                                                            SHA-256:2015BA2920185ACC6B27194B623BC7211FA93BAE40C7CE73DD315B8EC016A8A2
                                                                                                            SHA-512:5889042C324AABC2A4FE3F089A467B63928C3D002B6B065323425EFB6A66A73F18765EC81E89D6281DA8E201F1FC8240995E4E83A03691CE61203E202DBF6212
                                                                                                            Malicious:true
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>t
                                                                                                            C:\Users\user\AppData\Local\Temp\tmp6DFE.tmp
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1320
                                                                                                            Entropy (8bit):5.137611098420233
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0moxtn:cbk4oL600QydbQxIYODOLedq3Zoj
                                                                                                            MD5:3E2B26ED8B75AE83A269595180E84EF6
                                                                                                            SHA1:D30A0335FCCE406BCA8BA5764288235E6192F608
                                                                                                            SHA-256:108BE30AEB8EB31C185A39A6726F26DACBC4E4124951C61A29ADE4B7038C71EA
                                                                                                            SHA-512:B6981C68FCB886CC8379A068B96931B9D4F5CC5AA9BDC467E36C4168FE6C5273A2A84D8850B12C11703EC03AC6B1F1950D1E669EFCB59FC2402CE4BBA9DC03D3
                                                                                                            Malicious:false
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                                            C:\Users\user\AppData\Local\Temp\tmp71A9.tmp
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1310
                                                                                                            Entropy (8bit):5.109425792877704
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                                                                            MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                                                                            SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                                                                            SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                                                                            SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                                                                            Malicious:false
                                                                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                                                                            C:\Users\user\AppData\Roaming\AylDGlu.exe
                                                                                                            Process:C:\Users\user\Desktop\Order List.exe
                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Category:dropped
                                                                                                            Size (bytes):1167872
                                                                                                            Entropy (8bit):6.908581539026972
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:12288:hMLiJXfXUy8jmk63yoPSaEwvguKt+lCNkogRbHa1U/Fnmb68bEtFqTNmqUQzBRMo:iiwSClPuKtQoWbHWI/024TN+QzrMpnm
                                                                                                            MD5:E2893188B7E7D6F19581A7981C2A0A75
                                                                                                            SHA1:6A7A3D1ECB2175B53FB98974220F15EC6A1545CF
                                                                                                            SHA-256:09B6F40CF52BDE38B03CBF49A02E40370914AACFE727CDA9D6D9002CCE5DEBEB
                                                                                                            SHA-512:E970D0693A37412F3DC0564298768C9AA105D44B5BC5017F280A7FD3A525181AF06D0404F1DED2AABF10F85B6D6812FB189323FABBFDE27BA8CC63A3B787449F
                                                                                                            Malicious:true
                                                                                                            Antivirus:
                                                                                                            • Antivirus: ReversingLabs, Detection: 33%
                                                                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0......>.......... ........@.. ....................... ............@.................................x...S........;........................................................................... ............... ..H............text....... ...................... ..`.rsrc....;.......<..................@..@.reloc..............................@..B........................H...........`...........H~..............................................0..<.......(.... _.73 .O.Na%..^E................+.(..... .R..Z ..i.a+.*.0..U.......r...p. ..U. K.B.a%...^E................................C.......S...8....r...p(..... ...Z ck"|a+........s....(....%.(.....(.... ..{.+..(.... .%.8u....r...p(....(....,. B.q.%+. .2..%&. ...Za8G....r...p(....(....,. ..J.%+. ...%&. ..{oZa8....(..... .x..8.....(....(....rC..p(....-. ..C%+. .d.f%&. ..-.Za8.....,. ....%+. .V.
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):232
                                                                                                            Entropy (8bit):7.024371743172393
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                                                                                            MD5:32D0AAE13696FF7F8AF33B2D22451028
                                                                                                            SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                                                                                            SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                                                                                            SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                                                                                            Malicious:false
                                                                                                            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):8
                                                                                                            Entropy (8bit):3.0
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:xj:J
                                                                                                            MD5:8E9918AA34A4FC689DFB85A6EE58791E
                                                                                                            SHA1:E92F1026D08335FDC10AE043ED70C8C4ACA11E36
                                                                                                            SHA-256:F5BDA608F20CF1127744E7E62383FD2444872CC21ACA5C9773F346EADC4ED55E
                                                                                                            SHA-512:C66E7BED8D8C726607A225A88B8A7E5C1999FBA60915C9DF49F5F6140E8FC32B6481E2F041AF51DC095E17CAB4B819B42E7B47004742C7737DE6DE17ECBFB9CE
                                                                                                            Malicious:true
                                                                                                            Preview: c.'<.U.H
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bak
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):40
                                                                                                            Entropy (8bit):5.153055907333276
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                                                                            MD5:4E5E92E2369688041CC82EF9650EDED2
                                                                                                            SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                                                                            SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                                                                            SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                                                                            Malicious:false
                                                                                                            Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):80
                                                                                                            Entropy (8bit):5.153055907333276
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:9bzY6oRDT6P2bfVnXygY6oRDT6P2bfVn1:RzWDT62DWDT621
                                                                                                            MD5:4315325323A62DE913E5CCD153817BCE
                                                                                                            SHA1:8B38155CD8ACB20BBA0C2A8AF02BFD35B15221A8
                                                                                                            SHA-256:E0C2085D878FDF53CD7D8F0AA9F07490802C51FC3C14A52B6FEA96AD0743C838
                                                                                                            SHA-512:B5036A6CD4852CEBCA86F588D94B9D58B63EB07B2F4DEBD38D5E1BE68B0BB62F82FA239673B6C08F432A28DD50E1D15773DC3738251BD2F9959F1255D72745EB
                                                                                                            Malicious:false
                                                                                                            Preview: 9iH...}Z.4..f.~a........~.~.......3.U.9iH...}Z.4..f.~a........~.~.......3.U.
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:data
                                                                                                            Category:dropped
                                                                                                            Size (bytes):327432
                                                                                                            Entropy (8bit):7.99938831605763
                                                                                                            Encrypted:true
                                                                                                            SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                                                                                            MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                                                                                            SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                                                                                            SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                                                                                            SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                                                                                            Malicious:false
                                                                                                            Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                                                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):57
                                                                                                            Entropy (8bit):4.887726803973036
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:3:oMty8WddSJ8:oMLW6C
                                                                                                            MD5:6ECAFC0490DAB08E4A288E0042B6B613
                                                                                                            SHA1:4A4529907588505FC65CC9933980CFE6E576B3D6
                                                                                                            SHA-256:DC5F76FBF44B3E6CDDC14EA9E5BB9B6BD3A955197FE13F33F7DDA7ECC08E79E0
                                                                                                            SHA-512:7DA2B02627A36C8199814C250A1FBD61A9C18E098F8D691C11D75044E7F51DBD52C31EC2E1EA8CDEE5077ADCCB8CD247266F191292DB661FE7EA1B613FC646F8
                                                                                                            Malicious:false
                                                                                                            Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            \Device\ConDrv
                                                                                                            Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                            Category:dropped
                                                                                                            Size (bytes):298
                                                                                                            Entropy (8bit):4.943030742860529
                                                                                                            Encrypted:false
                                                                                                            SSDEEP:6:zx3M1tFAbQtU1R30qyMstwYVoRRZBXVN+J0fFdCsq2UTiMdH8stCal+n:zK13I30ZMt9BFN+QdCT2UftCM+
                                                                                                            MD5:6A9888952541A41F033EB114C24DC902
                                                                                                            SHA1:41903D7C8F31013C44572E09D97B9AAFBBCE77E6
                                                                                                            SHA-256:41A61D0084CD7884BEA1DF02ED9213CB8C83F4034F5C8156FC5B06D6A3E133CE
                                                                                                            SHA-512:E6AC898E67B4052375FDDFE9894B26D504A7827917BF3E02772CFF45C3FA7CC5E0EFFDC701D208E0DB89F05E42F195B1EC890F316BEE5CB8239AB45444DAA65E
                                                                                                            Malicious:false
                                                                                                            Preview: Microsoft (R) Build Engine version 4.7.3056.0..[Microsoft .NET Framework, version 4.0.30319.42000]..Copyright (C) Microsoft Corporation. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                                                            Static File Info

                                                                                                            General

                                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                            Entropy (8bit):6.908581539026972
                                                                                                            TrID:
                                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                                            File name:Order List.exe
                                                                                                            File size:1167872
                                                                                                            MD5:e2893188b7e7d6f19581a7981c2a0a75
                                                                                                            SHA1:6a7a3d1ecb2175b53fb98974220f15ec6a1545cf
                                                                                                            SHA256:09b6f40cf52bde38b03cbf49a02e40370914aacfe727cda9d6d9002cce5debeb
                                                                                                            SHA512:e970d0693a37412f3dc0564298768c9aa105d44b5bc5017f280a7fd3a525181af06d0404f1ded2aabf10f85b6d6812fb189323fabbfde27ba8cc63a3b787449f
                                                                                                            SSDEEP:12288:hMLiJXfXUy8jmk63yoPSaEwvguKt+lCNkogRbHa1U/Fnmb68bEtFqTNmqUQzBRMo:iiwSClPuKtQoWbHWI/024TN+QzrMpnm
                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0......>........... ........@.. ....................... ............@................................

                                                                                                            File Icon

                                                                                                            Icon Hash:e8ccd8d898ac84b0

                                                                                                            Static PE Info

                                                                                                            General

                                                                                                            Entrypoint:0x4db1ce
                                                                                                            Entrypoint Section:.text
                                                                                                            Digitally signed:false
                                                                                                            Imagebase:0x400000
                                                                                                            Subsystem:windows gui
                                                                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                            Time Stamp:0x6107AA90 [Mon Aug 2 08:19:28 2021 UTC]
                                                                                                            TLS Callbacks:
                                                                                                            CLR (.Net) Version:v4.0.30319
                                                                                                            OS Version Major:4
                                                                                                            OS Version Minor:0
                                                                                                            File Version Major:4
                                                                                                            File Version Minor:0
                                                                                                            Subsystem Version Major:4
                                                                                                            Subsystem Version Minor:0
                                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                            Entrypoint Preview

                                                                                                            Instruction
                                                                                                            jmp dword ptr [00402000h]
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al
                                                                                                            add byte ptr [eax], al

                                                                                                            Data Directories

                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xdb1780x53.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xdc0000x43b90.rsrc
                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1200000xc.reloc
                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                            Sections

                                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                            .text0x20000xd91d40xd9200False0.722661872121data7.42920521019IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                            .rsrc0xdc0000x43b900x43c00False0.06349818381data3.71639937012IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                            .reloc0x1200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                            Resources

                                                                                                            NameRVASizeTypeLanguageCountry
                                                                                                            RT_ICON0xdc1f00x468GLS_BINARY_LSB_FIRST
                                                                                                            RT_ICON0xdc6580x988data
                                                                                                            RT_ICON0xdcfe00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 328833692, next used block 110400919
                                                                                                            RT_ICON0xde0880x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                                                            RT_ICON0xe06300x3eff8data
                                                                                                            RT_GROUP_ICON0x11f6280x4cdata
                                                                                                            RT_VERSION0x11f6740x330data
                                                                                                            RT_MANIFEST0x11f9a40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                            Imports

                                                                                                            DLLImport
                                                                                                            mscoree.dll_CorExeMain

                                                                                                            Version Infos

                                                                                                            DescriptionData
                                                                                                            Translation0x0000 0x04b0
                                                                                                            LegalCopyrightCopyright Microsoft 2015
                                                                                                            Assembly Version1.0.0.0
                                                                                                            InternalNameecofAet.exe
                                                                                                            FileVersion1.0.0.0
                                                                                                            CompanyNameMicrosoft
                                                                                                            LegalTrademarks
                                                                                                            Comments
                                                                                                            ProductNamestuSys
                                                                                                            ProductVersion1.0.0.0
                                                                                                            FileDescriptionstuSys
                                                                                                            OriginalFilenameecofAet.exe

                                                                                                            Network Behavior

                                                                                                            Snort IDS Alerts

                                                                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                            08/02/21-10:37:48.444296TCP2025019ET TROJAN Possible NanoCore C2 60B4972021180192.168.2.579.134.225.115

                                                                                                            Network Port Distribution

                                                                                                            TCP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Aug 2, 2021 10:36:55.545634031 CEST4969480192.168.2.593.184.220.29
                                                                                                            Aug 2, 2021 10:37:45.966896057 CEST4967980192.168.2.58.253.95.249
                                                                                                            Aug 2, 2021 10:37:45.986520052 CEST80496798.253.95.249192.168.2.5
                                                                                                            Aug 2, 2021 10:37:45.986632109 CEST4967980192.168.2.58.253.95.249
                                                                                                            Aug 2, 2021 10:37:47.457376003 CEST804967793.184.220.29192.168.2.5
                                                                                                            Aug 2, 2021 10:37:47.457555056 CEST4967780192.168.2.593.184.220.29
                                                                                                            Aug 2, 2021 10:37:47.465976954 CEST49681443192.168.2.523.211.5.146
                                                                                                            Aug 2, 2021 10:37:47.466259003 CEST4968280192.168.2.593.184.220.29
                                                                                                            Aug 2, 2021 10:37:47.882853031 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:48.094882965 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:48.095026970 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:48.444295883 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:48.709353924 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:48.921909094 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.019455910 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.060343027 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.174405098 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.174550056 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.389699936 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.451085091 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.676028013 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.949367046 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.991055012 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.992948055 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.993057966 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.993128061 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.993216991 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.993278027 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.993304968 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.994165897 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.994411945 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.994455099 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.994489908 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.994517088 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.994568110 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:49.994637966 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:49.995371103 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.176512003 CEST4969280192.168.2.5104.18.25.243
                                                                                                            Aug 2, 2021 10:37:50.176589966 CEST4969180192.168.2.593.184.220.29
                                                                                                            Aug 2, 2021 10:37:50.212831974 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.213325024 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.213346958 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.213428974 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.214587927 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.214612961 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.214664936 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.215554953 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.215603113 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.215656996 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.216420889 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.216478109 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.216509104 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.217273951 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.217338085 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.217410088 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.219135046 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.219177008 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.219208956 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.219480991 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.219541073 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.219602108 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.220336914 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.220407009 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.220439911 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.221250057 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.221364975 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.221431017 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.222332954 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.222403049 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.432578087 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.433280945 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.433357000 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.433420897 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.437311888 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.437355042 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.437448025 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.438529015 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.438610077 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.438766956 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.439344883 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.439511061 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.439573050 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.440337896 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.440414906 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.441375971 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.441415071 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.441551924 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.441608906 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.443027973 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.443105936 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.443250895 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.443310976 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.443370104 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.443438053 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.443548918 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.443741083 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.443804026 CEST4972021180192.168.2.579.134.225.115
                                                                                                            Aug 2, 2021 10:37:50.444339991 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.444367886 CEST211804972079.134.225.115192.168.2.5
                                                                                                            Aug 2, 2021 10:37:50.444407940 CEST4972021180192.168.2.579.134.225.115

                                                                                                            UDP Packets

                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                            Aug 2, 2021 10:36:52.696764946 CEST5479553192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:52.721476078 CEST53547958.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:52.951451063 CEST4955753192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:52.978857994 CEST53495578.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:54.170504093 CEST6173353192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:54.199134111 CEST53617338.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:55.189388990 CEST6544753192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:55.218738079 CEST53654478.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:55.467132092 CEST5244153192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:55.503940105 CEST53524418.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:56.637178898 CEST6217653192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:56.662166119 CEST53621768.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:57.799081087 CEST5959653192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:57.831871033 CEST53595968.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:36:58.974387884 CEST6529653192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:36:59.000518084 CEST53652968.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:00.451422930 CEST6318353192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:00.480938911 CEST53631838.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:01.850739002 CEST6015153192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:01.879838943 CEST53601518.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:03.355778933 CEST5696953192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:03.389061928 CEST53569698.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:04.422868013 CEST5516153192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:04.447510004 CEST53551618.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:20.475544930 CEST5475753192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:20.510988951 CEST53547578.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:25.976667881 CEST4999253192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:26.012877941 CEST53499928.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:45.165153027 CEST6007553192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:45.207217932 CEST53600758.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:37:46.858176947 CEST5501653192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:37:46.893711090 CEST53550168.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:38:01.684149027 CEST6434553192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:38:01.716814995 CEST53643458.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:38:05.228482008 CEST5712853192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:38:05.265399933 CEST53571288.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:38:36.086673021 CEST5479153192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:38:36.119854927 CEST53547918.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:38:37.729825020 CEST5046353192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:38:37.771148920 CEST53504638.8.8.8192.168.2.5
                                                                                                            Aug 2, 2021 10:39:08.804861069 CEST5039453192.168.2.58.8.8.8
                                                                                                            Aug 2, 2021 10:39:08.841943026 CEST53503948.8.8.8192.168.2.5

                                                                                                            Code Manipulations

                                                                                                            Statistics

                                                                                                            Behavior

                                                                                                            Click to jump to process

                                                                                                            System Behavior

                                                                                                            General

                                                                                                            Start time:10:36:59
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Users\user\Desktop\Order List.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Users\user\Desktop\Order List.exe'
                                                                                                            Imagebase:0xe50000
                                                                                                            File size:1167872 bytes
                                                                                                            MD5 hash:E2893188B7E7D6F19581A7981C2A0A75
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.319940301.0000000004211000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.320367563.000000000426A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            Reputation:low

                                                                                                            General

                                                                                                            Start time:10:37:40
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\AylDGlu' /XML 'C:\Users\user\AppData\Local\Temp\tmp5BCE.tmp'
                                                                                                            Imagebase:0x920000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:10:37:40
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:10:37:41
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:{path}
                                                                                                            Imagebase:0x50000
                                                                                                            File size:261728 bytes
                                                                                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:10:37:42
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:{path}
                                                                                                            Imagebase:0x8d0000
                                                                                                            File size:261728 bytes
                                                                                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Yara matches:
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504687984.0000000006E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504506508.0000000006D90000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.500969666.0000000003FD6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.493600525.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504550437.0000000006DB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504550437.0000000006DB0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.500557956.0000000003D5E000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504188143.00000000065B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504188143.00000000065B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504614903.0000000006DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504614903.0000000006DE0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504566226.0000000006DC0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504566226.0000000006DC0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.503662031.0000000006240000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.503067769.0000000005510000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.503067769.0000000005510000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504637714.0000000006DF0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504637714.0000000006DF0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504719426.0000000006E20000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504719426.0000000006E20000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504589888.0000000006DD0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504589888.0000000006DD0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.496659781.0000000002D01000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.496725291.0000000002D80000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: NanoCore, Description: unknown, Source: 00000012.00000002.500995543.0000000003FEF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504402260.0000000006D50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504402260.0000000006D50000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504820469.0000000006E60000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504820469.0000000006E60000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000012.00000002.504524423.0000000006DA0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000012.00000002.504524423.0000000006DA0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                            Reputation:moderate

                                                                                                            General

                                                                                                            Start time:10:37:44
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp6DFE.tmp'
                                                                                                            Imagebase:0x920000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:10:37:44
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:10:37:45
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp71A9.tmp'
                                                                                                            Imagebase:0x920000
                                                                                                            File size:185856 bytes
                                                                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language
                                                                                                            Reputation:high

                                                                                                            General

                                                                                                            Start time:10:37:45
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language

                                                                                                            General

                                                                                                            Start time:10:37:45
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe 0
                                                                                                            Imagebase:0xcb0000
                                                                                                            File size:261728 bytes
                                                                                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET

                                                                                                            General

                                                                                                            Start time:10:37:46
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff604460000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language

                                                                                                            General

                                                                                                            Start time:10:37:48
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                                                                            Imagebase:0xa10000
                                                                                                            File size:261728 bytes
                                                                                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                            Antivirus matches:
                                                                                                            • Detection: 0%, Metadefender, Browse
                                                                                                            • Detection: 0%, ReversingLabs

                                                                                                            General

                                                                                                            Start time:10:37:49
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language

                                                                                                            General

                                                                                                            Start time:10:37:57
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                            Wow64 process (32bit):true
                                                                                                            Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                            Imagebase:0xd60000
                                                                                                            File size:261728 bytes
                                                                                                            MD5 hash:D621FD77BD585874F9686D3A76462EF1
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:.Net C# or VB.NET

                                                                                                            General

                                                                                                            Start time:10:37:58
                                                                                                            Start date:02/08/2021
                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                            Wow64 process (32bit):false
                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            Imagebase:0x7ff7ecfc0000
                                                                                                            File size:625664 bytes
                                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                            Has elevated privileges:true
                                                                                                            Has administrator privileges:true
                                                                                                            Programmed in:C, C++ or other language

                                                                                                            Disassembly

                                                                                                            Code Analysis

                                                                                                            Reset < >