Loading ...

Play interactive tourEdit tour

Windows Analysis Report Yeni sipari#U015f _WJO-001, pdf.exe

Overview

General Information

Sample Name:Yeni sipari#U015f _WJO-001, pdf.exe
Analysis ID:508404
MD5:7e0600a5300a5cd87fce0cf4398b578f
SHA1:c52fb2df7f32b3bfadaa923a67e59204bb306429
SHA256:5f86426410b741a6c2c5c3693069520197f2789e490a36c75ace1a4b2792cab6
Tags:exegeoNanoCoreRATTUR
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Yara detected Nanocore RAT
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Yeni sipari#U015f _WJO-001, pdf.exe (PID: 1380 cmdline: 'C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe' MD5: 7E0600A5300A5CD87FCE0CF4398B578F)
    • MSBuild.exe (PID: 4540 cmdline: {path} MD5: 88BBB7610152B48C2B3879473B17857E)
    • MSBuild.exe (PID: 6692 cmdline: {path} MD5: 88BBB7610152B48C2B3879473B17857E)
  • dhcpmon.exe (PID: 6112 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 2848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c44e3244-c9be-4fcb-8e75-051ae087", "Group": "MAX LOGS", "Domain1": "cashlink.ddns.net", "Domain2": "", "Port": 4774, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x70535:$x1: NanoCore.ClientPluginHost
    • 0x70572:$x2: IClientNetworkHost
    • 0x740a5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.MSBuild.exe.3ece424.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0x28269:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      • 0x28296:$x2: IClientNetworkHost
      5.2.MSBuild.exe.3ece424.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x28269:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0x29344:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      • 0x28283:$s5: IClientLoggingHost
      5.2.MSBuild.exe.3ece424.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        5.2.MSBuild.exe.2e916e0.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        5.2.MSBuild.exe.2e916e0.1.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 33 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6692, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Jbx Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c44e3244-c9be-4fcb-8e75-051ae087", "Group": "MAX LOGS", "Domain1": "cashlink.ddns.net", "Domain2": "", "Port": 4774, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Disable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Disable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTR
        Machine Learning detection for sampleShow sources
        Source: Yeni sipari#U015f _WJO-001, pdf.exeJoe Sandbox ML: detected
        Source: 5.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 5.2.MSBuild.exe.5640000.6.unpackAvira: Label: TR/NanoCore.fadte
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp
        Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp, dhcpmon.exe, dhcpmon.exe.5.dr
        Source: Binary string: indows\MSBuild.pdbpdbild.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs:
        Source: Malware configuration extractorURLs: cashlink.ddns.net
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: cashlink.ddns.net
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: Joe Sandbox ViewIP Address: 194.5.97.16 194.5.97.16
        Source: global trafficTCP traffic: 192.168.2.4:49772 -> 194.5.97.16:4774
        Source: dhcpmon.exe, 00000007.00000002.715333963.000000000062C000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.
        Source: dhcpmon.exe, 00000007.00000002.715333963.000000000062C000.00000004.00000020.sdmpString found in binary or memory: http://go.microsoft.LinkId=42127
        Source: Yeni sipari#U015f _WJO-001, pdf.exeString found in binary or memory: http://tempuri.org/XXXXXXXXXXXXXXXXXXXXXXX.xsd
        Source: Yeni sipari#U015f _WJO-001, pdf.exeString found in binary or memory: http://tempuri.org/XXXXXXXXXXXXXXXXXXXXXXX.xsd9WinForms_RecursiveFormCreate5WinForms_SeeInnerExcepti
        Source: Yeni sipari#U015f _WJO-001, pdf.exeString found in binary or memory: http://tempuri.org/sipDataSet.xsd
        Source: unknownDNS traffic detected: queries for: cashlink.ddns.net
        Source: dhcpmon.exe, 00000007.00000002.715298411.00000000005F8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: MSBuild.exe, 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTR

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.2e916e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.MSBuild.exe.53a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.943376551.00000000053A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.2e916e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.2e916e0.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.MSBuild.exe.53a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.53a0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.943376551.00000000053A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.943376551.00000000053A0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C7CA80
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C7EB48
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C72F60
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C71F18
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C710C8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C72970
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C74270
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C7F7E8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C72CA8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C710B8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C72CB8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C72962
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C6F98
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C4060
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C69CB
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0673
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C1A18
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0E00
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C03C8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C03B8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0BB8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0BA9
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0FA0
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0F91
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C6F88
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C5460
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C4053
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C4558
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0DF0
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C59E8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C51E0
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C19E1
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C51D1
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C09A8
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C4D98
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C0999
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C4197
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C4D88
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C5188
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C1980
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05053850
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_0505AF18
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_050523A0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05052FA8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05058648
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05059248
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_0505306F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_0505930F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05059AF0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_00016D08
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_00016950
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_0001692F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_02380708
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_0519119A NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_0519115F NtQuerySystemInformation,
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682329515.0000000002FF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs Yeni sipari#U015f _WJO-001, pdf.exe
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682398955.0000000003048000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Yeni sipari#U015f _WJO-001, pdf.exe
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.681581391.00000000008FC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameim3XXq5.exeX vs Yeni sipari#U015f _WJO-001, pdf.exe
        Source: Yeni sipari#U015f _WJO-001, pdf.exeBinary or memory string: OriginalFilenameim3XXq5.exeX vs Yeni sipari#U015f _WJO-001, pdf.exe
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe 'C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe'
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_029ABD02 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_029ABCCB AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05190F5A AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_05190F23 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Yeni sipari#U015f _WJO-001, pdf.exe.logJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@7/5@19/1
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: Yeni sipari#U015f _WJO-001, pdf.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2848:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c44e3244-c9be-4fcb-8e75-051ae0874277}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: dhcpmon.exe, 00000007.00000002.715008537.0000000000012000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
        Source: dhcpmon.exe, 00000007.00000002.715333963.000000000062C000.00000004.00000020.sdmpBinary or memory string: \??\C:\Program Files (x86)\DHCP Monitor\<.slne
        Source: dhcpmon.exe, 00000007.00000002.715008537.0000000000012000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: MSBuild MyApp.csproj /t:Clean /p:Configuration=Debug
        Source: dhcpmon.exe, 00000007.00000002.715008537.0000000000012000.00000002.00020000.sdmp, dhcpmon.exe.5.drBinary or memory string: *.sln+AmbiguousProjectError'MissingProjectError)ProjectNotFoundError)InvalidPropertyError
        Source: dhcpmon.exeBinary or memory string: *.sln
        Source: dhcpmon.exe, 00000007.00000002.715598767.00000000027B1000.00000004.00000001.sdmpBinary or memory string: q*)C:\Program Files (x86)\DHCP Monitor\*.sln
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Yeni sipari#U015f _WJO-001, pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp
        Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp, dhcpmon.exe, dhcpmon.exe.5.dr
        Source: Binary string: indows\MSBuild.pdbpdbild.pdb source: MSBuild.exe, 00000005.00000002.941974077.0000000002B35000.00000004.00000040.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, StartUp.cs.Net Code: XXXXXXXXX123 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.Yeni sipari#U015f _WJO-001, pdf.exe.830000.0.unpack, StartUp.cs.Net Code: XXXXXXXXX123 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.830000.0.unpack, StartUp.cs.Net Code: XXXXXXXXX123 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C77882 push ds; retf
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C7804D push ebx; ret
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C7780A pushfd ; retf
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_02C7842E push edx; iretd
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C3E7B push es; ret
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeCode function: 0_2_067C237F push es; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_00F674B8 push ebp; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_00F674AC push ecx; ret
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_00F69D7C push 7800F6CBh; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.48504821183
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 5.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTR
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe TID: 6496Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6748Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5252Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 1187
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 443
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 736
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess information queried: ProcessInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_051923EE GetSystemInfo,
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.682366311.0000000003027000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 402000
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 420000
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 422000
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: ABC008
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
        Source: C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe {path}
        Source: MSBuild.exe, 00000005.00000002.941668633.0000000001530000.00000002.00020000.sdmpBinary or memory string: Program Manager
        Source: MSBuild.exe, 00000005.00000002.941668633.0000000001530000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
        Source: MSBuild.exe, 00000005.00000002.941668633.0000000001530000.00000002.00020000.sdmpBinary or memory string: Progman
        Source: MSBuild.exe, 00000005.00000002.941668633.0000000001530000.00000002.00020000.sdmpBinary or memory string: Progmanlock
        Source: MSBuild.exe, 00000005.00000002.942052851.0000000002ED5000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: MSBuild.exe, 00000005.00000002.942052851.0000000002ED5000.00000004.00000001.sdmpBinary or memory string: Program Manager@~
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTR

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: Yeni sipari#U015f _WJO-001, pdf.exe, 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ed2a4d.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5644629.7.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ec95ee.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Yeni sipari#U015f _WJO-001, pdf.exe.40b9ca8.2.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.5640000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.MSBuild.exe.3ece424.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Yeni sipari#U015f _WJO-001, pdf.exe PID: 1380, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6692, type: MEMORYSTR
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_0519254A bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 5_2_051924F8 bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationPath InterceptionAccess Token Manipulation1Masquerading2Input Capture21Security Software Discovery11Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection312Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsSystem Information Discovery13SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Yeni sipari#U015f _WJO-001, pdf.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        5.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        5.2.MSBuild.exe.5640000.6.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        cashlink.ddns.net1%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        0%Avira URL Cloudsafe
        http://go.microsoft.0%URL Reputationsafe
        http://tempuri.org/sipDataSet.xsd2%VirustotalBrowse
        http://tempuri.org/sipDataSet.xsd0%Avira URL Cloudsafe
        http://tempuri.org/XXXXXXXXXXXXXXXXXXXXXXX.xsd0%Avira URL Cloudsafe
        http://go.microsoft.LinkId=421270%Avira URL Cloudsafe
        cashlink.ddns.net0%Avira URL Cloudsafe
        http://tempuri.org/XXXXXXXXXXXXXXXXXXXXXXX.xsd9WinForms_RecursiveFormCreate5WinForms_SeeInnerExcepti0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        cashlink.ddns.net
        194.5.97.16
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        true
        • Avira URL Cloud: safe
        low
        cashlink.ddns.nettrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://go.microsoft.dhcpmon.exe, 00000007.00000002.715333963.000000000062C000.00000004.00000020.sdmpfalse
        • URL Reputation: safe
        unknown
        http://tempuri.org/sipDataSet.xsdYeni sipari#U015f _WJO-001, pdf.exefalse
        • 2%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://tempuri.org/XXXXXXXXXXXXXXXXXXXXXXX.xsdYeni sipari#U015f _WJO-001, pdf.exefalse
        • Avira URL Cloud: safe
        unknown
        http://go.microsoft.LinkId=42127dhcpmon.exe, 00000007.00000002.715333963.000000000062C000.00000004.00000020.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://tempuri.org/XXXXXXXXXXXXXXXXXXXXXXX.xsd9WinForms_RecursiveFormCreate5WinForms_SeeInnerExceptiYeni sipari#U015f _WJO-001, pdf.exefalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        194.5.97.16
        cashlink.ddns.netNetherlands
        208476DANILENKODEtrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:508404
        Start date:25.10.2021
        Start time:08:21:59
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 10m 3s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Yeni sipari#U015f _WJO-001, pdf.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:19
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@7/5@19/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 0.6% (good quality ratio 0%)
        • Quality average: 0%
        • Quality standard deviation: 0%
        HCA Information:
        • Successful, ratio: 95%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 23.211.6.115, 13.107.246.254, 13.107.3.254, 52.113.196.254, 20.82.209.183, 209.197.3.8, 20.82.210.154, 80.67.82.211, 80.67.82.235, 40.91.112.76, 20.54.110.249, 40.112.88.60
        • Excluded domains from analysis (whitelisted): displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, s-ring.msedge.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, e12564.dspb.akamaiedge.net, teams-9999.teams-msedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, t-ring.msedge.net, s-ring.s-9999.s-msedge.net, ris.api.iris.microsoft.com, t-9999.t-msedge.net, store-images.s-microsoft.com, s-9999.s-msedge.net, teams-ring.teams-9999.teams-msedge.net, t-ring.t-9999.t-msedge.net, teams-ring.msedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        08:23:00API Interceptor1x Sleep call for process: Yeni sipari#U015f _WJO-001, pdf.exe modified
        08:23:06AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        194.5.97.16DHL_1012617429350,pdf.exeGet hashmaliciousBrowse
          DHL_1012617429350,pdf.exeGet hashmaliciousBrowse
            1012617429350,pdf.exeGet hashmaliciousBrowse
              AWB# 2617429350,pdf.exeGet hashmaliciousBrowse
                Yeni Sipari#U015f # 765-3523663, pdf.exeGet hashmaliciousBrowse
                  Nuevo pedido _WJO-001,pdf.exeGet hashmaliciousBrowse
                    765-3523663 ,pdf.exeGet hashmaliciousBrowse
                      New Order #86-55113,pdf.exeGet hashmaliciousBrowse
                        Nuevo pedido # 765-3523663 ,pdf.exeGet hashmaliciousBrowse
                          Nuevo pedido # 86-55113,pdf.exeGet hashmaliciousBrowse
                            Nuevo pedido # 86-55113 .pdf.exeGet hashmaliciousBrowse
                              Nuevo pedido # 86-55113,pdf.exeGet hashmaliciousBrowse
                                Urgent RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                  OC CVE6535 TVOP-MIO 16(C) 2021,pdf.exeGet hashmaliciousBrowse
                                    Pos withdrawal reduced to 0.5%.exeGet hashmaliciousBrowse

                                      Domains

                                      No context

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      DANILENKODE7STXNgZD3g.exeGet hashmaliciousBrowse
                                      • 194.5.98.107
                                      ORIGINAL DOCUMENTS BL, C.I. & PACKING LIST.exeGet hashmaliciousBrowse
                                      • 194.5.98.158
                                      Comprobante de pago.xlsGet hashmaliciousBrowse
                                      • 194.5.98.74
                                      Comprobante de pago.docGet hashmaliciousBrowse
                                      • 194.5.98.40
                                      AWB # 1012617429350,pdf.exeGet hashmaliciousBrowse
                                      • 194.5.97.23
                                      SK202-8 #YN12-60387.exeGet hashmaliciousBrowse
                                      • 194.5.97.207
                                      nIXnNtZvtI.exeGet hashmaliciousBrowse
                                      • 194.5.98.205
                                      SecuriteInfo.com.VB.Trojan.Valyria.3530.8728.xlsGet hashmaliciousBrowse
                                      • 194.5.98.249
                                      DHL_1012617429350,pdf.exeGet hashmaliciousBrowse
                                      • 194.5.97.23
                                      Pago_Monex_usd.xlsGet hashmaliciousBrowse
                                      • 194.5.98.46
                                      Niki-Gmbh Germany Inquiry.exeGet hashmaliciousBrowse
                                      • 194.5.97.97
                                      new.exeGet hashmaliciousBrowse
                                      • 194.5.98.212
                                      XdZ4ad8GpU.exeGet hashmaliciousBrowse
                                      • 194.5.98.48
                                      we-ship-SNE-9874657.xlsxGet hashmaliciousBrowse
                                      • 194.5.98.48
                                      Bankdetails86507.exeGet hashmaliciousBrowse
                                      • 194.5.98.126
                                      Order Quotation Request_pdf.exeGet hashmaliciousBrowse
                                      • 194.5.97.128
                                      IMG0000030_Pago_SWIFT.exeGet hashmaliciousBrowse
                                      • 194.5.98.202
                                      2qDKwiGx46.exeGet hashmaliciousBrowse
                                      • 194.5.98.134
                                      Specifications.docx.exeGet hashmaliciousBrowse
                                      • 194.5.97.212
                                      Specifications.xls.exeGet hashmaliciousBrowse
                                      • 194.5.97.212

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFeDEx AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                                        09142021_PDF.vbsGet hashmaliciousBrowse
                                          P0 (2021)-2790 new order.exeGet hashmaliciousBrowse
                                            TNT AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                                              BankSlip.exeGet hashmaliciousBrowse
                                                PAYMENT ERROR.exeGet hashmaliciousBrowse
                                                  DHL AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                                                    DHL AWB TRACKING DETAILS.exeGet hashmaliciousBrowse
                                                      PcgYFOwcNQ.exeGet hashmaliciousBrowse
                                                        Invoice Fanpage Karma.bat.exeGet hashmaliciousBrowse
                                                          zslaUKmBfr.exeGet hashmaliciousBrowse
                                                            scanbankdoc210999796432225.bat.exeGet hashmaliciousBrowse
                                                              SecuriteInfo.com.Variant.Zusy.394472.4088.exeGet hashmaliciousBrowse
                                                                SecuriteInfo.com.W32.AIDetect.malware1.17748.exeGet hashmaliciousBrowse
                                                                  fnnEkbo4cW.exeGet hashmaliciousBrowse
                                                                    kAGA3XtSEaOxfvA.exeGet hashmaliciousBrowse
                                                                      PO 18-3081.exeGet hashmaliciousBrowse
                                                                        Order417.exeGet hashmaliciousBrowse
                                                                          PCT0002982765627827BC.exeGet hashmaliciousBrowse
                                                                            NO19800800.exeGet hashmaliciousBrowse

                                                                              Created / dropped Files

                                                                              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):69632
                                                                              Entropy (8bit):5.20894581699571
                                                                              Encrypted:false
                                                                              SSDEEP:768:NElGiBcBuiyFjUwF0wdP9/rJMDnRFRJfStGpwV3e3qtAcy:ilGBu7jjP9/tMDn9Jt+VO3GO
                                                                              MD5:88BBB7610152B48C2B3879473B17857E
                                                                              SHA1:0F6CF8DD66AA58CE31DA4E8AC0631600EF055636
                                                                              SHA-256:2C7ACC16D19D076D67E9F1F37984935899B79536C9AC6EEC8850C44D20F87616
                                                                              SHA-512:5BACDF6C190A76C2C6A9A3519936E08E898AC8A2B1384D60429DF850BE778860435BF9E5EB316517D2345A5AAE201F369863F7A242134253978BCB5B2179CA58
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Joe Sandbox View:
                                                                              • Filename: FeDEx AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                              • Filename: 09142021_PDF.vbs, Detection: malicious, Browse
                                                                              • Filename: P0 (2021)-2790 new order.exe, Detection: malicious, Browse
                                                                              • Filename: TNT AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                              • Filename: BankSlip.exe, Detection: malicious, Browse
                                                                              • Filename: PAYMENT ERROR.exe, Detection: malicious, Browse
                                                                              • Filename: DHL AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                              • Filename: DHL AWB TRACKING DETAILS.exe, Detection: malicious, Browse
                                                                              • Filename: PcgYFOwcNQ.exe, Detection: malicious, Browse
                                                                              • Filename: Invoice Fanpage Karma.bat.exe, Detection: malicious, Browse
                                                                              • Filename: zslaUKmBfr.exe, Detection: malicious, Browse
                                                                              • Filename: scanbankdoc210999796432225.bat.exe, Detection: malicious, Browse
                                                                              • Filename: SecuriteInfo.com.Variant.Zusy.394472.4088.exe, Detection: malicious, Browse
                                                                              • Filename: SecuriteInfo.com.W32.AIDetect.malware1.17748.exe, Detection: malicious, Browse
                                                                              • Filename: fnnEkbo4cW.exe, Detection: malicious, Browse
                                                                              • Filename: kAGA3XtSEaOxfvA.exe, Detection: malicious, Browse
                                                                              • Filename: PO 18-3081.exe, Detection: malicious, Browse
                                                                              • Filename: Order417.exe, Detection: malicious, Browse
                                                                              • Filename: PCT0002982765627827BC.exe, Detection: malicious, Browse
                                                                              • Filename: NO19800800.exe, Detection: malicious, Browse
                                                                              Reputation:moderate, very likely benign file
                                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.....................@........... ........@.. .......................@......99....@.....................................S.......`/................... ....................................................... ............... ..H............text....... ...................... ..`.rsrc...`/.......0..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Yeni sipari#U015f _WJO-001, pdf.exe.log
                                                                              Process:C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):664
                                                                              Entropy (8bit):5.288448637977022
                                                                              Encrypted:false
                                                                              SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                                                                              MD5:B1DB55991C3DA14E35249AEA1BC357CA
                                                                              SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                                                                              SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                                                                              SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                                                                              Malicious:true
                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:modified
                                                                              Size (bytes):441
                                                                              Entropy (8bit):5.388715099859351
                                                                              Encrypted:false
                                                                              SSDEEP:12:Q3LaJU20NaL10U2+gYhD5itZbgbe4MqJsGMe4M6:MLF20NaL32+g2OH4xvn4j
                                                                              MD5:88F0104DB9A3F9BC4F0FC3805F571B0D
                                                                              SHA1:CDD4F34385792F0CCE0A844F4ABB447C25AB4E73
                                                                              SHA-256:F6C11D3D078ED73F2640DA510E68DEEAA5F14F79CAE2E23A254B4E37C7D0230F
                                                                              SHA-512:04B977F63CAB8DE20EA7EFA9D4299C2E625D92FA6D54CA03EECD9F322E978326B353824F23BEC0E712083BDE0DBC5CC4EE90922137106B096050CA46A166DF0E
                                                                              Malicious:false
                                                                              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                              File Type:International EBCDIC text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):8
                                                                              Entropy (8bit):3.0
                                                                              Encrypted:false
                                                                              SSDEEP:3:Z8:Z8
                                                                              MD5:43EDE2DCA45F13D48C642FFE1081E662
                                                                              SHA1:E60E211D5742F3AC1C891A586CAB2138B23CEEFF
                                                                              SHA-256:B247C2053D99F6AB51812F74E0859DA326EE30524D14CC37A6FD34A7DDEA12BE
                                                                              SHA-512:56E66BFD8589C030E2777306C917728706E27415BF2B17FF12FFC6011786668BE2ECA1F2CD328D594A5516BFD917AD5650CAD86FDFA044582C5993BEB80EF871
                                                                              Malicious:true
                                                                              Preview: Vi.....H
                                                                              \Device\ConDrv
                                                                              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):306
                                                                              Entropy (8bit):4.969261552825097
                                                                              Encrypted:false
                                                                              SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFdCsq2UTiMdH8stCal+n:zK1XnV30ZsGMIG9BFRbQdCT2UftCM+
                                                                              MD5:F227448515085A647910907084E6728E
                                                                              SHA1:5FA1A8E28B084DA25A1BBC51A2D75810CEF57E2C
                                                                              SHA-256:662BA47D628FE8EBE95DD47B4482110A10B49AED09387BC0E028BB66E68E20BD
                                                                              SHA-512:6F6E5DFFF7B17C304FB19B0BA5466AF84EF98A5C2EFA573AF72CFD3ED6964E9FD7F8E4B79FCFFBEF87CE545418C69D4984F4DD60BBF457D0A3640950F8FC5AF0
                                                                              Malicious:false
                                                                              Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                                              Static File Info

                                                                              General

                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Entropy (8bit):7.26643085265657
                                                                              TrID:
                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                              File name:Yeni sipari#U015f _WJO-001, pdf.exe
                                                                              File size:884224
                                                                              MD5:7e0600a5300a5cd87fce0cf4398b578f
                                                                              SHA1:c52fb2df7f32b3bfadaa923a67e59204bb306429
                                                                              SHA256:5f86426410b741a6c2c5c3693069520197f2789e490a36c75ace1a4b2792cab6
                                                                              SHA512:d339f29c09bf5d79b597af2299123c70b3a1be02a325d7254413ce23c4230065d95fa68b21138730d6c0d4ae94717ea7ac9664f58c2bfc8bd7605bb3b43f916a
                                                                              SSDEEP:24576:Fba+q9hGIdbYGMszLPgVmIsAleFHH+HHHHHWHVHCUXGHnHHhHraHoeXO:FbNSV/HOmIpeFHH+HHHHHWHVHCUXGHnt
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....sa..............P..h..........n.... ........@.. ....................................@................................

                                                                              File Icon

                                                                              Icon Hash:00d0524c687048a0

                                                                              Static PE Info

                                                                              General

                                                                              Entrypoint:0x4a876e
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                              Time Stamp:0x6173E0F7 [Sat Oct 23 10:16:23 2021 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:v2.0.50727
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                              Entrypoint Preview

                                                                              Instruction
                                                                              jmp dword ptr [00402000h]
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al
                                                                              add byte ptr [eax], al

                                                                              Data Directories

                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa871c0x4f.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x31040.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                              Sections

                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x20000xa67740xa6800False0.71680274024data7.48504821183IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                              .rsrc0xaa0000x310400x31200False0.423564726463data5.88116448591IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xdc0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                              Resources

                                                                              NameRVASizeTypeLanguageCountry
                                                                              RT_ICON0xaa2b00x9001PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                              RT_ICON0xb32b40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                                              RT_ICON0xc3adc0x94a8data
                                                                              RT_ICON0xccf840x5488data
                                                                              RT_ICON0xd240c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
                                                                              RT_ICON0xd66340x25a8data
                                                                              RT_ICON0xd8bdc0x10a8data
                                                                              RT_ICON0xd9c840x988data
                                                                              RT_ICON0xda60c0x468GLS_BINARY_LSB_FIRST
                                                                              RT_GROUP_ICON0xdaa740x84data
                                                                              RT_VERSION0xdaaf80x35cdata
                                                                              RT_MANIFEST0xdae540x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                              Imports

                                                                              DLLImport
                                                                              mscoree.dll_CorExeMain

                                                                              Version Infos

                                                                              DescriptionData
                                                                              Translation0x0000 0x04b0
                                                                              LegalCopyrightCopyright 2012
                                                                              Assembly Version1.0.0.0
                                                                              InternalNameim3XXq5.exe
                                                                              FileVersion1.0.0.0
                                                                              CompanyName
                                                                              LegalTrademarks
                                                                              Comments
                                                                              ProductNameSistem Informasi Penginapan
                                                                              ProductVersion1.0.0.0
                                                                              FileDescriptionSistem Informasi Penginapan
                                                                              OriginalFilenameim3XXq5.exe

                                                                              Network Behavior

                                                                              Snort IDS Alerts

                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                              10/25/21-08:23:06.720778UDP254DNS SPOOF query response with TTL of 1 min. and no authority53530978.8.8.8192.168.2.4
                                                                              10/25/21-08:23:13.047508UDP254DNS SPOOF query response with TTL of 1 min. and no authority53492578.8.8.8192.168.2.4
                                                                              10/25/21-08:23:19.338896UDP254DNS SPOOF query response with TTL of 1 min. and no authority53499108.8.8.8192.168.2.4
                                                                              10/25/21-08:23:31.723363UDP254DNS SPOOF query response with TTL of 1 min. and no authority53537008.8.8.8192.168.2.4
                                                                              10/25/21-08:23:38.861357UDP254DNS SPOOF query response with TTL of 1 min. and no authority53517268.8.8.8192.168.2.4
                                                                              10/25/21-08:24:22.408140UDP254DNS SPOOF query response with TTL of 1 min. and no authority53512558.8.8.8192.168.2.4
                                                                              10/25/21-08:24:37.557508UDP254DNS SPOOF query response with TTL of 1 min. and no authority53605798.8.8.8192.168.2.4
                                                                              10/25/21-08:24:43.309583UDP254DNS SPOOF query response with TTL of 1 min. and no authority53492288.8.8.8192.168.2.4
                                                                              10/25/21-08:24:54.742082UDP254DNS SPOOF query response with TTL of 1 min. and no authority53559168.8.8.8192.168.2.4
                                                                              10/25/21-08:25:06.910564UDP254DNS SPOOF query response with TTL of 1 min. and no authority53605428.8.8.8192.168.2.4

                                                                              Network Port Distribution

                                                                              TCP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Oct 25, 2021 08:23:06.731641054 CEST497724774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:07.557070017 CEST477449772194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:08.098453045 CEST497724774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:08.287816048 CEST477449772194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:08.801680088 CEST497724774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:08.996725082 CEST477449772194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:13.049412966 CEST497734774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:13.415987968 CEST477449773194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:13.927197933 CEST497734774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:14.101680994 CEST477449773194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:14.614669085 CEST497734774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:14.798801899 CEST477449773194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:19.387490034 CEST497754774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:19.566262960 CEST477449775194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:20.118135929 CEST497754774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:20.305656910 CEST477449775194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:20.912035942 CEST497754774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:21.091766119 CEST477449775194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:25.147382021 CEST497814774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:25.330944061 CEST477449781194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:25.834309101 CEST497814774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:26.834553957 CEST477449781194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:27.334477901 CEST497814774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:27.523027897 CEST477449781194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:31.726943016 CEST497844774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:32.045989037 CEST477449784194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:32.553559065 CEST497844774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:33.823034048 CEST477449784194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:34.335231066 CEST497844774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:34.821727991 CEST477449784194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:38.864166021 CEST497854774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:41.867567062 CEST497854774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:42.421914101 CEST477449785194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:42.929528952 CEST497854774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:43.140013933 CEST477449785194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:47.223056078 CEST497874774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:48.248806953 CEST477449787194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:48.758069038 CEST497874774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:49.041254044 CEST477449787194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:49.555145979 CEST497874774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:49.751879930 CEST477449787194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:53.783086061 CEST497884774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:56.791364908 CEST497884774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:58.633023977 CEST477449788194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:23:59.133991003 CEST497884774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:23:59.327039957 CEST477449788194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:03.386073112 CEST497914774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:04.051368952 CEST477449791194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:04.554755926 CEST497914774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:04.801326990 CEST477449791194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:05.306370020 CEST497914774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:05.486150026 CEST477449791194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:10.187477112 CEST497944774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:10.365905046 CEST477449794194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:11.009902954 CEST497944774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:11.242218018 CEST477449794194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:11.916450977 CEST497944774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:12.107764959 CEST477449794194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:16.144431114 CEST497994774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:16.520164967 CEST477449799194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:17.026246071 CEST497994774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:17.205069065 CEST477449799194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:17.713825941 CEST497994774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:18.297115088 CEST477449799194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:22.450315952 CEST498014774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:25.464417934 CEST498014774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:25.649441957 CEST477449801194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:26.167530060 CEST498014774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:26.380956888 CEST477449801194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:30.417890072 CEST498024774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:31.991596937 CEST477449802194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:32.496155024 CEST498024774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:32.802727938 CEST477449802194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:33.308670998 CEST498024774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:33.492352962 CEST477449802194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:37.559695005 CEST498204774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:37.770746946 CEST477449820194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:38.277856112 CEST498204774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:38.511590958 CEST477449820194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:39.012273073 CEST498204774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:39.189702034 CEST477449820194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:43.410763025 CEST498404774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:43.616600990 CEST477449840194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:44.122107983 CEST498404774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:44.308103085 CEST477449840194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:44.809648037 CEST498404774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:44.999694109 CEST477449840194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:49.038379908 CEST498424774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:49.216681957 CEST477449842194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:49.731971979 CEST498424774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:49.911642075 CEST477449842194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:50.419555902 CEST498424774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:50.607680082 CEST477449842194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:54.743608952 CEST498434774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:55.175014973 CEST477449843194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:55.685590982 CEST498434774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:55.875725031 CEST477449843194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:24:56.388844967 CEST498434774192.168.2.4194.5.97.16
                                                                              Oct 25, 2021 08:24:56.579386950 CEST477449843194.5.97.16192.168.2.4
                                                                              Oct 25, 2021 08:25:00.617253065 CEST498614774192.168.2.4194.5.97.16

                                                                              UDP Packets

                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Oct 25, 2021 08:23:06.696093082 CEST5309753192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:06.720777988 CEST53530978.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:13.027206898 CEST4925753192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:13.047508001 CEST53492578.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:19.315490961 CEST4991053192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:19.338896036 CEST53499108.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:25.126760006 CEST6315353192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:25.145519018 CEST53631538.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:31.702912092 CEST5370053192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:31.723362923 CEST53537008.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:38.841285944 CEST5172653192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:38.861356974 CEST53517268.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:47.204689980 CEST5653453192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:47.221677065 CEST53565348.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:23:53.762490034 CEST5662753192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:23:53.781286001 CEST53566278.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:03.365789890 CEST6311653192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:03.384665966 CEST53631168.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:10.144007921 CEST6480153192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:10.160450935 CEST53648018.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:16.123938084 CEST6172153192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:16.142330885 CEST53617218.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:22.384063959 CEST5125553192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:22.408139944 CEST53512558.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:30.390775919 CEST6152253192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:30.410547972 CEST53615228.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:37.539165974 CEST6057953192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:37.557507992 CEST53605798.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:43.288317919 CEST4922853192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:43.309582949 CEST53492288.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:49.017062902 CEST5979453192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:49.035656929 CEST53597948.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:24:54.721607924 CEST5591653192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:24:54.742082119 CEST53559168.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:25:00.597276926 CEST5275253192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:25:00.615669012 CEST53527528.8.8.8192.168.2.4
                                                                              Oct 25, 2021 08:25:06.890649080 CEST6054253192.168.2.48.8.8.8
                                                                              Oct 25, 2021 08:25:06.910563946 CEST53605428.8.8.8192.168.2.4

                                                                              DNS Queries

                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                              Oct 25, 2021 08:23:06.696093082 CEST192.168.2.48.8.8.80x4a0Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:13.027206898 CEST192.168.2.48.8.8.80x5f07Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:19.315490961 CEST192.168.2.48.8.8.80x174cStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:25.126760006 CEST192.168.2.48.8.8.80x9075Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:31.702912092 CEST192.168.2.48.8.8.80xe166Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:38.841285944 CEST192.168.2.48.8.8.80xe8b6Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:47.204689980 CEST192.168.2.48.8.8.80x1fc2Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:53.762490034 CEST192.168.2.48.8.8.80xfec7Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:03.365789890 CEST192.168.2.48.8.8.80x9a74Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:10.144007921 CEST192.168.2.48.8.8.80x6ef3Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:16.123938084 CEST192.168.2.48.8.8.80x5010Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:22.384063959 CEST192.168.2.48.8.8.80x9341Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:30.390775919 CEST192.168.2.48.8.8.80x23aaStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:37.539165974 CEST192.168.2.48.8.8.80x1deStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:43.288317919 CEST192.168.2.48.8.8.80xa70bStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:49.017062902 CEST192.168.2.48.8.8.80xeb8cStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:54.721607924 CEST192.168.2.48.8.8.80xcf0cStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:25:00.597276926 CEST192.168.2.48.8.8.80xbcd5Standard query (0)cashlink.ddns.netA (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:25:06.890649080 CEST192.168.2.48.8.8.80xc4fbStandard query (0)cashlink.ddns.netA (IP address)IN (0x0001)

                                                                              DNS Answers

                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                              Oct 25, 2021 08:23:06.720777988 CEST8.8.8.8192.168.2.40x4a0No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:13.047508001 CEST8.8.8.8192.168.2.40x5f07No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:19.338896036 CEST8.8.8.8192.168.2.40x174cNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:25.145519018 CEST8.8.8.8192.168.2.40x9075No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:31.723362923 CEST8.8.8.8192.168.2.40xe166No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:38.861356974 CEST8.8.8.8192.168.2.40xe8b6No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:47.221677065 CEST8.8.8.8192.168.2.40x1fc2No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:23:53.781286001 CEST8.8.8.8192.168.2.40xfec7No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:03.384665966 CEST8.8.8.8192.168.2.40x9a74No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:10.160450935 CEST8.8.8.8192.168.2.40x6ef3No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:16.142330885 CEST8.8.8.8192.168.2.40x5010No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:22.408139944 CEST8.8.8.8192.168.2.40x9341No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:30.410547972 CEST8.8.8.8192.168.2.40x23aaNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:37.557507992 CEST8.8.8.8192.168.2.40x1deNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:43.309582949 CEST8.8.8.8192.168.2.40xa70bNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:49.035656929 CEST8.8.8.8192.168.2.40xeb8cNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:24:54.742082119 CEST8.8.8.8192.168.2.40xcf0cNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:25:00.615669012 CEST8.8.8.8192.168.2.40xbcd5No error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)
                                                                              Oct 25, 2021 08:25:06.910563946 CEST8.8.8.8192.168.2.40xc4fbNo error (0)cashlink.ddns.net194.5.97.16A (IP address)IN (0x0001)

                                                                              Code Manipulations

                                                                              Statistics

                                                                              Behavior

                                                                              Click to jump to process

                                                                              System Behavior

                                                                              General

                                                                              Start time:08:22:59
                                                                              Start date:25/10/2021
                                                                              Path:C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Users\user\Desktop\Yeni sipari#U015f _WJO-001, pdf.exe'
                                                                              Imagebase:0x830000
                                                                              File size:884224 bytes
                                                                              MD5 hash:7E0600A5300A5CD87FCE0CF4398B578F
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.684104761.0000000004101000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.683440077.0000000003FF1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              Reputation:low

                                                                              General

                                                                              Start time:08:23:02
                                                                              Start date:25/10/2021
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:{path}
                                                                              Imagebase:0x420000
                                                                              File size:69632 bytes
                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:08:23:02
                                                                              Start date:25/10/2021
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:{path}
                                                                              Imagebase:0x870000
                                                                              File size:69632 bytes
                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Yara matches:
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.943511160.0000000005640000.00000004.00020000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.942525404.0000000003EC7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                              • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.940978754.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.943376551.00000000053A0000.00000004.00020000.sdmp, Author: Florian Roth
                                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.943376551.00000000053A0000.00000004.00020000.sdmp, Author: Florian Roth
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:08:23:15
                                                                              Start date:25/10/2021
                                                                              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                              Imagebase:0x10000
                                                                              File size:69632 bytes
                                                                              MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:.Net C# or VB.NET
                                                                              Antivirus matches:
                                                                              • Detection: 0%, Metadefender, Browse
                                                                              • Detection: 0%, ReversingLabs
                                                                              Reputation:moderate

                                                                              General

                                                                              Start time:08:23:17
                                                                              Start date:25/10/2021
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff724c50000
                                                                              File size:625664 bytes
                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high

                                                                              Disassembly

                                                                              Code Analysis

                                                                              Reset < >