Loading ...

Play interactive tourEdit tour

Windows Analysis Report Orden de Compra -SA765443,pdf.exe

Overview

General Information

Sample Name:Orden de Compra -SA765443,pdf.exe
Analysis ID:527111
MD5:f7f223c7625c5c9df43af835298c1183
SHA1:2105dc6b41d1ec220e89fb018fb1fd95b9a22d5a
SHA256:7a356a718b0ca6272486633efb6a34c6301007f50766d8cfab60a996f2729935
Tags:exeNanoCoreRAT
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected AntiVM3
Detected Nanocore Rat
Yara detected Nanocore RAT
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Sigma detected: Suspicius Add Task From User AppData Temp
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • Orden de Compra -SA765443,pdf.exe (PID: 6196 cmdline: "C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe" MD5: F7F223C7625C5C9DF43AF835298C1183)
    • Orden de Compra -SA765443,pdf.exe (PID: 6548 cmdline: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe MD5: F7F223C7625C5C9DF43AF835298C1183)
      • schtasks.exe (PID: 6712 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "c78d90a0-5de6-4b77-9d98-da24b367", "Group": "CHIBOY", "Domain1": "wealthgod1234.ddns.net", "Domain2": "127.0.0.1", "Port": 4693, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 4995, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x435d5:$a: NanoCore
    • 0x4362e:$a: NanoCore
    • 0x4366b:$a: NanoCore
    • 0x436e4:$a: NanoCore
    • 0x56d8f:$a: NanoCore
    • 0x56da4:$a: NanoCore
    • 0x56dd9:$a: NanoCore
    • 0x6fd7b:$a: NanoCore
    • 0x6fd90:$a: NanoCore
    • 0x6fdc5:$a: NanoCore
    • 0x43637:$b: ClientPlugin
    • 0x43674:$b: ClientPlugin
    • 0x43f72:$b: ClientPlugin
    • 0x43f7f:$b: ClientPlugin
    • 0x56b4b:$b: ClientPlugin
    • 0x56b66:$b: ClientPlugin
    • 0x56b96:$b: ClientPlugin
    • 0x56dad:$b: ClientPlugin
    • 0x56de2:$b: ClientPlugin
    • 0x6fb37:$b: ClientPlugin
    • 0x6fb52:$b: ClientPlugin
    00000000.00000002.266827018.0000000002CA1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 60 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe38d:$x1: NanoCore.ClientPluginHost
        • 0xe3ca:$x2: IClientNetworkHost
        • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe105:$x1: NanoCore Client.exe
        • 0xe38d:$x2: NanoCore.ClientPluginHost
        • 0xf9c6:$s1: PluginCommand
        • 0xf9ba:$s2: FileCommand
        • 0x1086b:$s3: PipeExists
        • 0x16622:$s4: PipeCreated
        • 0xe3b7:$s5: IClientLoggingHost
        0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
          • 0xe0f5:$a: NanoCore
          • 0xe105:$a: NanoCore
          • 0xe339:$a: NanoCore
          • 0xe34d:$a: NanoCore
          • 0xe38d:$a: NanoCore
          • 0xe154:$b: ClientPlugin
          • 0xe356:$b: ClientPlugin
          • 0xe396:$b: ClientPlugin
          • 0xe27b:$c: ProjectData
          • 0xec82:$d: DESCrypto
          • 0x1664e:$e: KeepAlive
          • 0x1463c:$g: LogClientMessage
          • 0x10837:$i: get_Connected
          • 0xefb8:$j: #=q
          • 0xefe8:$j: #=q
          • 0xf004:$j: #=q
          • 0xf034:$j: #=q
          • 0xf050:$j: #=q
          • 0xf06c:$j: #=q
          • 0xf09c:$j: #=q
          • 0xf0b8:$j: #=q
          14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 116 entries

          Sigma Overview

          AV Detection:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe, ProcessId: 6548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          E-Banking Fraud:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe, ProcessId: 6548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          System Summary:

          barindex
          Sigma detected: Suspicius Add Task From User AppData TempShow sources
          Source: Process startedAuthor: frack113: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe, ParentImage: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe, ParentProcessId: 6548, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp, ProcessId: 6712

          Stealing of Sensitive Information:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe, ProcessId: 6548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Remote Access Functionality:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe, ProcessId: 6548, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "c78d90a0-5de6-4b77-9d98-da24b367", "Group": "CHIBOY", "Domain1": "wealthgod1234.ddns.net", "Domain2": "127.0.0.1", "Port": 4693, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 4995, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.514335905.000000000404D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTR
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpackAvira: Label: TR/NanoCore.fadte
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 4x nop then jmp 0129A224h
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 4x nop then jmp 0129A224h
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 4x nop then jmp 0169A224h
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 4x nop then jmp 0169A224h

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: wealthgod1234.ddns.net
          Source: Malware configuration extractorURLs: 127.0.0.1
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: wealthgod1234.ddns.net
          Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
          Source: Joe Sandbox ViewIP Address: 185.140.53.12 185.140.53.12
          Source: global trafficTCP traffic: 192.168.2.7:49756 -> 185.140.53.12:4693
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpString found in binary or memory: http://www.chinhdo.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: wealthgod1234.ddns.net
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.266021612.0000000000F5B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.514335905.000000000404D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTR

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.3299750.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.5ad0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.3034bbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.516734883.0000000005AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.3299750.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.3299750.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.5ad0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.5ad0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.3034bbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.3034bbc.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.516734883.0000000005AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.516734883.0000000005AD0000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_0129A060
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_01298410
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_0129B4C8
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_0129E188
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_0129A053
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_0752F338
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_07522113
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_0752D978
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_07523ADF
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_07523AF0
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_07523890
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 0_2_075238A0
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 5_2_0555E471
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 5_2_0555E480
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 5_2_0555BBD4
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_0169A060
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_01698410
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_0169B4C8
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_0169E188
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_0169A050
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_0757D978
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_07572113
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_07573ADF
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_07573AF0
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_07573890
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 9_2_075738A0
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 14_2_0197E480
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 14_2_0197E471
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeCode function: 14_2_0197BBD4
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.265515025.00000000008EC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBinaryAssemblyIn.exeP vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.266827018.0000000002CA1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTransactionalFileManager.dllf# vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.266021612.0000000000F5B000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000000.260346348.0000000000D7C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBinaryAssemblyIn.exeP vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.516882135.00000000066A0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.293137418.0000000000E3C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBinaryAssemblyIn.exeP vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameTransactionalFileManager.dllf# vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 0000000E.00000000.292208495.0000000000F2C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameBinaryAssemblyIn.exeP vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exeBinary or memory string: OriginalFilenameBinaryAssemblyIn.exeP vs Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeFile read: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeJump to behavior
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe "C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe"
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe "C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe" 0
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Orden de Compra -SA765443,pdf.exe.logJump to behavior
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp62E7.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/5@16/1
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{c78d90a0-5de6-4b77-9d98-da24b3672291}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_01
          Source: Orden de Compra -SA765443,pdf.exe, ue000.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.Orden de Compra -SA765443,pdf.exe.860000.0.unpack, ue000.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.Orden de Compra -SA765443,pdf.exe.860000.0.unpack, ue000.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.cf0000.5.unpack, ue000.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.cf0000.0.unpack, ue000.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.cf0000.3.unpack, ue000.csCryptographic APIs: 'CreateDecryptor'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Orden de Compra -SA765443,pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: initial sampleStatic PE information: section name: .text entropy: 7.72977166234
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (67).png
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeFile opened: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.322a178.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.2cca178.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.266827018.0000000002CA1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.266922252.0000000002CDE000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.295061035.000000000323E000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.266827018.0000000002CA1000.00000004.00000001.sdmp, Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.266827018.0000000002CA1000.00000004.00000001.sdmp, Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe TID: 6200Thread sleep time: -32640s >= -30000s
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe TID: 6232Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe TID: 6860Thread sleep time: -13835058055282155s >= -30000s
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe TID: 6868Thread sleep time: -34498s >= -30000s
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe TID: 6916Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe TID: 5872Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeWindow / User API: threadDelayed 4239
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeWindow / User API: threadDelayed 5280
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeWindow / User API: foregroundWindowGot 870
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 32640
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 34498
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeThread delayed: delay time: 922337203685477
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeMemory written: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeMemory written: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeProcess created: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512339089.0000000001A40000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.516849356.00000000065AB000.00000004.00000010.sdmpBinary or memory string: Program Manager
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512339089.0000000001A40000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512339089.0000000001A40000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512339089.0000000001A40000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.514335905.000000000404D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTR

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: Orden de Compra -SA765443,pdf.exe, 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Orden de Compra -SA765443,pdf.exe, 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Orden de Compra -SA765443,pdf.exe, 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Orden de Compra -SA765443,pdf.exe, 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Orden de Compra -SA765443,pdf.exe, 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b4629.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.427b7f6.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.4284c55.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.428062c.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.405062c.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4069618.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.Orden de Compra -SA765443,pdf.exe.4054c55.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4386a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3d02698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.Orden de Compra -SA765443,pdf.exe.4262698.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Orden de Compra -SA765443,pdf.exe.3e26a60.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.514335905.000000000404D000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6196, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6548, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 6864, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Orden de Compra -SA765443,pdf.exe PID: 4220, type: MEMORYSTR

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading11Input Capture21Security Software Discovery11Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          No Antivirus matches

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          5.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.2.Orden de Compra -SA765443,pdf.exe.66b0000.8.unpack100%AviraTR/NanoCore.fadteDownload File
          5.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.0.Orden de Compra -SA765443,pdf.exe.400000.12.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.0.Orden de Compra -SA765443,pdf.exe.400000.8.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.0.Orden de Compra -SA765443,pdf.exe.400000.4.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.2.Orden de Compra -SA765443,pdf.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          5.0.Orden de Compra -SA765443,pdf.exe.400000.6.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.0.Orden de Compra -SA765443,pdf.exe.400000.10.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

          Domains

          SourceDetectionScannerLabelLink
          wealthgod1234.ddns.net2%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          wealthgod1234.ddns.net2%VirustotalBrowse
          wealthgod1234.ddns.net0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.chinhdo.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          127.0.0.10%VirustotalBrowse
          127.0.0.10%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          wealthgod1234.ddns.net
          185.140.53.12
          truetrueunknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          wealthgod1234.ddns.nettrue
          • 2%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          127.0.0.1true
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
            high
            http://www.fontbureau.comOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designersGOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designers/?Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                    high
                    http://www.tiro.comOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-jones.htmlOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8Orden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                            high
                            http://www.fonts.comOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                              high
                              http://www.sandoll.co.krOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.chinhdo.comOrden de Compra -SA765443,pdf.exe, 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comOrden de Compra -SA765443,pdf.exe, 00000000.00000002.270115374.0000000006C02000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              185.140.53.12
                              wealthgod1234.ddns.netSweden
                              209623DAVID_CRAIGGGtrue

                              General Information

                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:527111
                              Start date:23.11.2021
                              Start time:11:58:19
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 11m 1s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:Orden de Compra -SA765443,pdf.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:29
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@9/5@16/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 1% (good quality ratio 0.4%)
                              • Quality average: 26.6%
                              • Quality standard deviation: 36%
                              HCA Information:
                              • Successful, ratio: 90%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .exe
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 23.211.6.115
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              11:59:21API Interceptor921x Sleep call for process: Orden de Compra -SA765443,pdf.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              185.140.53.12Hemotronik Nov Acil PO_76565,pdf.exeGet hashmaliciousBrowse
                                SOMECO Nov Acil PO_76565,pdf.exeGet hashmaliciousBrowse
                                  Sifari#U015fin t#U0259sdiq edilm#U0259si _ T#U0259cili,pdf.exeGet hashmaliciousBrowse
                                    AWB # 2617429350,pdf.exeGet hashmaliciousBrowse
                                      AWB # 2617429350,pdf.exeGet hashmaliciousBrowse
                                        C.GNew pedido WJO-001,pdf.exeGet hashmaliciousBrowse
                                          DHL_119040 re#U00e7u,pdf (2).exeGet hashmaliciousBrowse
                                            Confirmaci#U00f3n de pedido nuevo-5309,pdf.exeGet hashmaliciousBrowse
                                              Urgente RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                                Urgent RFQ_AP65425652_03242,pdf.exeGet hashmaliciousBrowse
                                                  vmw7WdkJ6k.exeGet hashmaliciousBrowse
                                                    CONTRACT PMA1911003.exeGet hashmaliciousBrowse
                                                      003663-37399.exeGet hashmaliciousBrowse
                                                        BingUpdate.exeGet hashmaliciousBrowse
                                                          Documents RF V23665.exeGet hashmaliciousBrowse

                                                            Domains

                                                            No context

                                                            ASN

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            DAVID_CRAIGGGpurchase order 0112.exeGet hashmaliciousBrowse
                                                            • 185.140.53.137
                                                            9mMANDmw9O.exeGet hashmaliciousBrowse
                                                            • 91.193.75.190
                                                            TR0398734893 50601251.exeGet hashmaliciousBrowse
                                                            • 185.140.53.131
                                                            swift.xlsGet hashmaliciousBrowse
                                                            • 91.193.75.212
                                                            SOA_0009877890.exeGet hashmaliciousBrowse
                                                            • 185.244.30.58
                                                            8UYr1od7iW.exeGet hashmaliciousBrowse
                                                            • 91.193.75.148
                                                            928272_Payment_Receipt.vbsGet hashmaliciousBrowse
                                                            • 185.140.53.3
                                                            N2K18_Payment_Copy.vbsGet hashmaliciousBrowse
                                                            • 185.140.53.3
                                                            U2M19O_Payment_Copy.vbsGet hashmaliciousBrowse
                                                            • 185.140.53.3
                                                            J3m1a_Payment_Copy.vbsGet hashmaliciousBrowse
                                                            • 185.140.53.3
                                                            18-11-21 Statement.xlsxGet hashmaliciousBrowse
                                                            • 91.193.75.148
                                                            bWKXCwatmt.exeGet hashmaliciousBrowse
                                                            • 91.193.75.148
                                                            17-11-21 STATEMENT.xlsxGet hashmaliciousBrowse
                                                            • 91.193.75.148
                                                            Copy of Complaint report-1st Nov21 to 16th Nov21.xlsxGet hashmaliciousBrowse
                                                            • 91.193.75.148
                                                            UTYHFG03983765367839837653.exeGet hashmaliciousBrowse
                                                            • 185.140.53.131
                                                            IkGcQX45T8.exeGet hashmaliciousBrowse
                                                            • 91.193.75.148
                                                            vcjjMWSZx8.exeGet hashmaliciousBrowse
                                                            • 185.140.53.138
                                                            000876543234567.exeGet hashmaliciousBrowse
                                                            • 185.244.30.58
                                                            Dhl_Shipment_one.exeGet hashmaliciousBrowse
                                                            • 185.140.53.137
                                                            PO.E210115.exeGet hashmaliciousBrowse
                                                            • 185.244.30.252

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Orden de Compra -SA765443,pdf.exe.log
                                                            Process:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.355304211458859
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                            C:\Users\user\AppData\Local\Temp\tmp62E7.tmp
                                                            Process:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1323
                                                            Entropy (8bit):5.12284374389714
                                                            Encrypted:false
                                                            SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0kxtn:cbk4oL600QydbQxIYODOLedq3Jj
                                                            MD5:38A67D49BD1B250B49E9E6A7ECD6CD14
                                                            SHA1:4FDD0D9B3F3E4E5B48CA231343324E30951BE2E3
                                                            SHA-256:6DD0B3C0DFA7950B1DEDA930882F3E84912932021A76F853561BA640816D4251
                                                            SHA-512:86DB3AF07E0180504DCBFCE1FC1BC7F6A00F12BD8AF76774382E3B4CEF4BD5ED9FBDEE8089F772AA075B973257C922C4E89C279B4E09362173794617B7BF60AC
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                            Process:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):128
                                                            Entropy (8bit):6.527114648336088
                                                            Encrypted:false
                                                            SSDEEP:3:XrURGizD7cnRH5/ljRAaTlKYrI1Sj9txROIsxcMek2:X4LDAn1rplKTYBROIsxek2
                                                            MD5:0A9C5EAE8756D6FC90F59D8D71A79E1E
                                                            SHA1:0F7D6AAED17CD18DC614535ED26335C147E29ED7
                                                            SHA-256:B1921EA14C66927397BAF3FA456C22B93C30C3DE23546087C0B18551CE5001C5
                                                            SHA-512:78C2F399AC49C78D89915DFF99AC955B5E0AB07BAAD61B07B0CE073C88C1D3A9F1D302C2413691B349DD34441B0FF909C08A4F71E2F1B73F46C1FF308BC7CF9A
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview: Gj.h\.3.A...5.x..&...i+..c(1.P.OT....g.t......'7......)..8zII..K/....n3...3.5.......&.7].)..wL...:}g...@...mV.....JUP...w
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                            Process:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):8
                                                            Entropy (8bit):3.0
                                                            Encrypted:false
                                                            SSDEEP:3:0keIt:0A
                                                            MD5:94B41CFEE4E2B49BD4C1E82A95852AF4
                                                            SHA1:4BB08756493EB9A0E663E0688E451841BC9BE9CD
                                                            SHA-256:42CE8F756A9AF3726B6EFDA3823B0DBB539AB1EDF322B08B807E4ADD86A819E7
                                                            SHA-512:96A9FC234C38C2D983CE8EED8823EF3F9E2E907B6EE967DEF3981F7ED6E351654F58B98B5877A3620D2FC84C0171EB9DA92BC3B0EA8B030ABCD78B8CE90423BF
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview: .>.....H
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                            Process:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.608288146260291
                                                            Encrypted:false
                                                            SSDEEP:3:oN0naRRqXIgq9EDDJ:oNcSRqXIFED9
                                                            MD5:FC28A690D1E29EEEC388DFB51CCB3449
                                                            SHA1:D20184CB0468F8BA3D1481A9BD72CB8956FB10AA
                                                            SHA-256:5DC03F18C097ACE50982402ED7A9829F8ECDAEAFC6E048147E5AA871DEEF845F
                                                            SHA-512:B1B8A12EC1EAB4634BE96CD46D1B24AA2B1797E531EAB965DE4BE752CB0B1CED61713FDF4B635F76B10F92A3E9AE62C6D7087F9BD4E5758BF6062E31AB165C07
                                                            Malicious:false
                                                            Preview: C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.69147440283363
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:Orden de Compra -SA765443,pdf.exe
                                                            File size:577536
                                                            MD5:f7f223c7625c5c9df43af835298c1183
                                                            SHA1:2105dc6b41d1ec220e89fb018fb1fd95b9a22d5a
                                                            SHA256:7a356a718b0ca6272486633efb6a34c6301007f50766d8cfab60a996f2729935
                                                            SHA512:0238b920a0f2afc3df08c5634573037eaf649464f0324afc3a1bc1ca1aafe858bb31e75feb1c487cdbf6a8496a5128c21fda112fe439c45299f10d853a0ed290
                                                            SSDEEP:12288:sglS4oq0RueU5AzUJCjKs7pw2i/FB8r7S5Ud3EWtD00UxZ:NlSoEfUAWE7UFS3cUWWC0Ux
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a..............0......D........... ........@.. .......................@............@................................

                                                            File Icon

                                                            Icon Hash:c49a0894909c6494

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x48a81e
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x619CB29F [Tue Nov 23 09:21:35 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:v4.0.30319
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                            Entrypoint Preview

                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8a7cc0x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x4200.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x920000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x888240x88a00False0.853445934355data7.72977166234IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x8c0000x42000x4200False0.455669981061data5.72908968706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x920000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_ICON0x8c1900x468GLS_BINARY_LSB_FIRST
                                                            RT_ICON0x8c5f80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 1134929317, next used block 44344484
                                                            RT_ICON0x8d6a00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                            RT_GROUP_ICON0x8fc480x30data
                                                            RT_VERSION0x8fc780x388data
                                                            RT_MANIFEST0x900000x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                            Imports

                                                            DLLImport
                                                            mscoree.dll_CorExeMain

                                                            Version Infos

                                                            DescriptionData
                                                            Translation0x0000 0x04b0
                                                            LegalCopyright(C) 2009
                                                            Assembly Version1.1.0.0
                                                            InternalNameBinaryAssemblyIn.exe
                                                            FileVersion1.1.0.0
                                                            CompanyNameJoseph Magnin
                                                            LegalTrademarks
                                                            CommentsDental
                                                            ProductNameGitHub ValidationEngine
                                                            ProductVersion1.1.0.0
                                                            FileDescriptionGitHub ValidationEngine
                                                            OriginalFilenameBinaryAssemblyIn.exe

                                                            Network Behavior

                                                            Snort IDS Alerts

                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            11/23/21-11:59:33.326172UDP254DNS SPOOF query response with TTL of 1 min. and no authority53546408.8.8.8192.168.2.7
                                                            11/23/21-11:59:39.867599UDP254DNS SPOOF query response with TTL of 1 min. and no authority53587398.8.8.8192.168.2.7
                                                            11/23/21-11:59:52.949500UDP254DNS SPOOF query response with TTL of 1 min. and no authority53597628.8.8.8192.168.2.7
                                                            11/23/21-12:00:21.346042UDP254DNS SPOOF query response with TTL of 1 min. and no authority53507818.8.8.8192.168.2.7
                                                            11/23/21-12:00:28.959265UDP254DNS SPOOF query response with TTL of 1 min. and no authority53504528.8.8.8192.168.2.7
                                                            11/23/21-12:00:49.940231UDP254DNS SPOOF query response with TTL of 1 min. and no authority53492478.8.8.8192.168.2.7
                                                            11/23/21-12:00:56.951611UDP254DNS SPOOF query response with TTL of 1 min. and no authority53560648.8.8.8192.168.2.7
                                                            11/23/21-12:01:11.033668UDP254DNS SPOOF query response with TTL of 1 min. and no authority53614578.8.8.8192.168.2.7
                                                            11/23/21-12:01:18.086716UDP254DNS SPOOF query response with TTL of 1 min. and no authority53583678.8.8.8192.168.2.7

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 23, 2021 11:59:33.337551117 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:33.574400902 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:33.574518919 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:33.633510113 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:33.868426085 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:33.868505955 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:33.993396997 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.055079937 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.130394936 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.130495071 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.330420017 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.442317009 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.531650066 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.760502100 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.760591030 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.905227900 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.905368090 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.921463013 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.921520948 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.925437927 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.925528049 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.925600052 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.930630922 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.930704117 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.936819077 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.936903000 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.940973043 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.941088915 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.951020956 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.951116085 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.954480886 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.954556942 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:34.976289034 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:34.976392984 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.032165051 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.113380909 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.119410992 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.119518042 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.129333019 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.197905064 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.197951078 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.197987080 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.197997093 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.198024035 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.198055029 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.198061943 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.198100090 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.198120117 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.210349083 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.210514069 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.210557938 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.233959913 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.233982086 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.234052896 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.291506052 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.291533947 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.291549921 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.291565895 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.291627884 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.291671038 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.296436071 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.296473980 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.296596050 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.313451052 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.313713074 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.324222088 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.324258089 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.324328899 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.342457056 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.406476974 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.406502008 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.406573057 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.462531090 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518480062 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518520117 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518544912 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518567085 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.518570900 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518615007 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.518876076 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518922091 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.518953085 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.519022942 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.519084930 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.519128084 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584332943 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584371090 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584398031 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584419966 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584444046 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584465027 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584486961 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584532022 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.584549904 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.584611893 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.589833021 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.589958906 CET497564693192.168.2.7185.140.53.12
                                                            Nov 23, 2021 11:59:35.595310926 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.596344948 CET469349756185.140.53.12192.168.2.7
                                                            Nov 23, 2021 11:59:35.596997976 CET497564693192.168.2.7185.140.53.12

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 23, 2021 11:59:33.304900885 CET5464053192.168.2.78.8.8.8
                                                            Nov 23, 2021 11:59:33.326172113 CET53546408.8.8.8192.168.2.7
                                                            Nov 23, 2021 11:59:39.846254110 CET5873953192.168.2.78.8.8.8
                                                            Nov 23, 2021 11:59:39.867599010 CET53587398.8.8.8192.168.2.7
                                                            Nov 23, 2021 11:59:46.156789064 CET5871753192.168.2.78.8.8.8
                                                            Nov 23, 2021 11:59:46.177053928 CET53587178.8.8.8192.168.2.7
                                                            Nov 23, 2021 11:59:52.927398920 CET5976253192.168.2.78.8.8.8
                                                            Nov 23, 2021 11:59:52.949500084 CET53597628.8.8.8192.168.2.7
                                                            Nov 23, 2021 11:59:59.120119095 CET5432953192.168.2.78.8.8.8
                                                            Nov 23, 2021 11:59:59.140615940 CET53543298.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:06.133011103 CET5945153192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:06.153048038 CET53594518.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:14.324692011 CET6456953192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:14.345205069 CET53645698.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:21.321403027 CET5078153192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:21.346041918 CET53507818.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:28.937688112 CET5045253192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:28.959264994 CET53504528.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:35.907048941 CET5882053192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:35.926978111 CET53588208.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:43.069562912 CET6098353192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:43.087691069 CET53609838.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:49.920238972 CET4924753192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:49.940231085 CET53492478.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:00:56.928706884 CET5606453192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:00:56.951611042 CET53560648.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:01:03.983671904 CET6374453192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:01:04.004245996 CET53637448.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:01:11.011229992 CET6145753192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:01:11.033668041 CET53614578.8.8.8192.168.2.7
                                                            Nov 23, 2021 12:01:18.065009117 CET5836753192.168.2.78.8.8.8
                                                            Nov 23, 2021 12:01:18.086715937 CET53583678.8.8.8192.168.2.7

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Nov 23, 2021 11:59:33.304900885 CET192.168.2.78.8.8.80xfe0dStandard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:39.846254110 CET192.168.2.78.8.8.80x6ab8Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:46.156789064 CET192.168.2.78.8.8.80x5df9Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:52.927398920 CET192.168.2.78.8.8.80x1e6aStandard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:59.120119095 CET192.168.2.78.8.8.80x4104Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:06.133011103 CET192.168.2.78.8.8.80x8c5dStandard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:14.324692011 CET192.168.2.78.8.8.80x4d13Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:21.321403027 CET192.168.2.78.8.8.80xfab1Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:28.937688112 CET192.168.2.78.8.8.80xc73eStandard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:35.907048941 CET192.168.2.78.8.8.80x2e41Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:43.069562912 CET192.168.2.78.8.8.80x6ffStandard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:49.920238972 CET192.168.2.78.8.8.80x6285Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:56.928706884 CET192.168.2.78.8.8.80xd645Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:01:03.983671904 CET192.168.2.78.8.8.80xf269Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:01:11.011229992 CET192.168.2.78.8.8.80xd872Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:01:18.065009117 CET192.168.2.78.8.8.80x2040Standard query (0)wealthgod1234.ddns.netA (IP address)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Nov 23, 2021 11:59:33.326172113 CET8.8.8.8192.168.2.70xfe0dNo error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:39.867599010 CET8.8.8.8192.168.2.70x6ab8No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:46.177053928 CET8.8.8.8192.168.2.70x5df9No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:52.949500084 CET8.8.8.8192.168.2.70x1e6aNo error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 11:59:59.140615940 CET8.8.8.8192.168.2.70x4104No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:06.153048038 CET8.8.8.8192.168.2.70x8c5dNo error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:14.345205069 CET8.8.8.8192.168.2.70x4d13No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:21.346041918 CET8.8.8.8192.168.2.70xfab1No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:28.959264994 CET8.8.8.8192.168.2.70xc73eNo error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:35.926978111 CET8.8.8.8192.168.2.70x2e41No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:43.087691069 CET8.8.8.8192.168.2.70x6ffNo error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:49.940231085 CET8.8.8.8192.168.2.70x6285No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:00:56.951611042 CET8.8.8.8192.168.2.70xd645No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:01:04.004245996 CET8.8.8.8192.168.2.70xf269No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:01:11.033668041 CET8.8.8.8192.168.2.70xd872No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)
                                                            Nov 23, 2021 12:01:18.086715937 CET8.8.8.8192.168.2.70x2040No error (0)wealthgod1234.ddns.net185.140.53.12A (IP address)IN (0x0001)

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:11:59:13
                                                            Start date:23/11/2021
                                                            Path:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe"
                                                            Imagebase:0x860000
                                                            File size:577536 bytes
                                                            MD5 hash:F7F223C7625C5C9DF43AF835298C1183
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.266827018.0000000002CA1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.266922252.0000000002CDE000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.268195690.0000000003CA9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:11:59:22
                                                            Start date:23/11/2021
                                                            Path:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            Imagebase:0xcf0000
                                                            File size:577536 bytes
                                                            MD5 hash:F7F223C7625C5C9DF43AF835298C1183
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.262435507.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.516892703.00000000066B0000.00000004.00020000.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.261948516.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.512725162.0000000003001000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.263642925.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.516734883.0000000005AD0000.00000004.00020000.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.516734883.0000000005AD0000.00000004.00020000.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000000.262924739.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.514335905.000000000404D000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.507112354.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:11:59:27
                                                            Start date:23/11/2021
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp62E7.tmp
                                                            Imagebase:0x170000
                                                            File size:185856 bytes
                                                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:11:59:29
                                                            Start date:23/11/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff774ee0000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:11:59:31
                                                            Start date:23/11/2021
                                                            Path:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe" 0
                                                            Imagebase:0xdb0000
                                                            File size:577536 bytes
                                                            MD5 hash:F7F223C7625C5C9DF43AF835298C1183
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.294956289.0000000003201000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.296236042.0000000004209000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.295061035.000000000323E000.00000004.00000001.sdmp, Author: Joe Security
                                                            Reputation:low

                                                            General

                                                            Start time:11:59:35
                                                            Start date:23/11/2021
                                                            Path:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\Orden de Compra -SA765443,pdf.exe
                                                            Imagebase:0xea0000
                                                            File size:577536 bytes
                                                            MD5 hash:F7F223C7625C5C9DF43AF835298C1183
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.310703445.0000000004239000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.289660204.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.309326840.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.290829502.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.310601454.0000000003231000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.292078484.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000000.291488537.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >